Tamper evident computer housing lock

    公开(公告)号:US11988022B1

    公开(公告)日:2024-05-21

    申请号:US17476593

    申请日:2021-09-16

    CPC classification number: E05B65/006 E05B73/0082

    Abstract: The housing lock includes a barrel, a screw and a bumper. The screw and bumper are threadedly engaged with one another and slidably engaged with the barrel. A barrel passageway includes a screw stop limiting sliding of the screw and bumper assembly in the distal direction and a bumper stop limiting sliding of the screw and bumper assembly in the proximal direction. The barrel includes feet. The perimeter defined by the feet is selected to closely fit within a housing passage in order to limit rotational movement of the housing lock within the housing passageway. The length of the feet is selected to prevent manipulation of the lockout of the housing passageway once the lock is secured to the housing. The barrel provides an exterior housing stop limiting movement of the housing lock relative to the housing in a distal direction. The bumper provides an interior housing stop limiting movement of the housing lock relative to the housing in a proximal direction. When secured to housing, the housing lock prevents removal of the housing cover from the housing chassis.

    Adaptive deception system
    3.
    发明授权

    公开(公告)号:US11934948B1

    公开(公告)日:2024-03-19

    申请号:US16930046

    申请日:2020-07-15

    CPC classification number: G06N3/08 G06N3/04 H04L63/1491

    Abstract: An adaptive deception system is provided for defending a production network against cyber-attacks utilizing deception devices on the production network. The adaptive deception system includes a deception management system. The deception management system includes monitors for making observations regarding the deception devices including observations of an attacker's interaction with the deception device. The adaptive deception system further incudes a control system having sensors that receive the observations of the deception management system. The control system is configured to provide an adaption specification in response to the observations made. Actuators of the control system are activated in order to provide the adaption specification to the deception management system where monitors of the deception management system implement the specified adaption. Implementation of the adaption adapts the properties of the deception devices to interfere with the cyber-attacker.

    General purpose neural processor
    4.
    发明授权

    公开(公告)号:US11640524B1

    公开(公告)日:2023-05-02

    申请号:US17459079

    申请日:2021-08-27

    Inventor: David J Mountain

    Abstract: A computer processor includes an on-chip network and a plurality of tiles. Each tile includes an input circuit to receive a voltage signal from the network, and a crossbar array, including at least one neuron. The neuron includes first and second bit lines, a programmable resistor connecting the voltage signal to the first bit line, and a comparator to receive inputs from the two bit lines and to output a voltage, when a bypass condition is not active. Each tile includes a programming circuit to set a resistance value of the resistor, a pass-through circuit to provide the voltage signal to an input circuit of a first additional tile, when a pass-through condition is active, a bypass circuit to provide values of the bit lines to a second additional tile, when the bypass condition is active; and at least one output circuit to provide an output signal to the network.

    System and method for cryptologically tethering user devices to one another in adaptable manner for trusted communication across untrusted network

    公开(公告)号:US12199958B1

    公开(公告)日:2025-01-14

    申请号:US17894855

    申请日:2022-08-24

    Abstract: A high assurance system provides for communication between trusted user devices with auxiliary adaptation for augmenting communication security across an untrusted environment. First and second main encrypting devices coupled to respective trusted user devices are cryptologically tethered to one another by a main communication link established across the untrusted environment between trusted user devices in cryptologically protected manner. An auxiliary encrypting device is cryptologically tethered to the first main encrypting device by an auxiliary communication link established across the untrusted environment between a trusted auxiliary device and one trusted user device in cryptologically protected manner. The main and auxiliary encrypting devices define portals traverse trust boundaries between trusted and untrusted environments, each including at least one encryption unit and a communication unit coupled thereto by a connectionless interconnect. The encryption unit encrypts and decrypts message data, while the communication unit transmits and receives encrypted message data through the communication links.

    Systems and methods of minimal perfect hashing with XORSAT filters

    公开(公告)号:US11997186B1

    公开(公告)日:2024-05-28

    申请号:US16950161

    申请日:2020-11-17

    Inventor: Sean A. Weaver

    CPC classification number: H04L9/0643

    Abstract: A computer-implemented method of constructing a minimal perfect hash function includes selecting a set H of k hash functions over a set Y of n keys and building a bipartite graph from keys to hash values using the set Y of keys and the set H of hash functions. Each edge of the bipartite graph has a weight equal to an index of a hash function associated with that edge. The method also includes determining a minimal weight perfect matching of the bipartite graph and generating an XORSAT filter using the minimal weight perfect matching of the bipartite graph, such that a minimal perfect hash function can be performed on an element by querying the XORSAT filter for a result associated with the element.

    Social media client fingerprinting

    公开(公告)号:US12197473B1

    公开(公告)日:2025-01-14

    申请号:US17519000

    申请日:2021-11-04

    Abstract: A method is disclosed for identifying related social media accounts of a social media platform, based on social media clients used to interact with the platform. The method includes obtaining a first dataset of information including, for each interaction between the accounts and the platform, the client used. The method also includes using the first dataset to generate a pruned dataset including accounts, clients, and numbers of interactions by using an unsupervised machine learning algorithm to identify and exclude outlier accounts and outlier clients. The method also includes normalizing the pruned dataset across accounts. The method also includes identifying a connected sub-component of the pruned dataset. The method also includes performing topic modeling of the sub-component to generate a matrix W associating the accounts of the sub-component with topics. The method also includes determining, using the matrix W, that a first account A is associated with a second account B.

    Asynchronous reversible flux soliton logic gates

    公开(公告)号:US12166259B1

    公开(公告)日:2024-12-10

    申请号:US18367203

    申请日:2023-09-12

    Abstract: A reversible superconducting circuit includes two Josephson transmission lines. Inductors connect Josephson Junctions in the array. Each transmission line passes a fluxon along the Junctions. The circuit includes an interface with first and second shunt capacitors coupled to the first and second transmission lines, and a third shunt capacitor, forming a connecting circuit with the first and second shunt capacitors. The shunt capacitors include Josephson junctions in parallel. The connecting circuit receives an input fluxon and transmits an output fluxon. The circuit also includes a Josephson Junction and inductor in parallel with the third shunt capacitor, forming a storage circuit. The storage circuit stores a SFQ. The output fluxon has polarity based on the SFQ stored when the first fluxon is received. The input fluxon causes the polarity of the stored SFQ to be the same as the polarity of the input fluxon, immediately after the input fluxon is received.

Patent Agency Ranking