TECHNOLOGIES FOR MANUFACTURING AN ENGINEERED BIO-SYSTEM
    51.
    发明申请
    TECHNOLOGIES FOR MANUFACTURING AN ENGINEERED BIO-SYSTEM 审中-公开
    制造工程生物系统的技术

    公开(公告)号:US20160281094A1

    公开(公告)日:2016-09-29

    申请号:US14672100

    申请日:2015-03-28

    IPC分类号: C12N15/63 G01N33/50 C12N15/10

    CPC分类号: G01N33/5038 G16B5/00

    摘要: Technologies for manufacturing an engineered biological system include determining a plurality of functions to be performed by the engineered biological system while in a corresponding state. The engineered biological system is to transition between states based on the presence of a corresponding transition trigger defined by a biological key associated with each state. A state machine mapping is generated for the manufacture of the engineered biological system. The engineered biological system is verified and subsequently activated in a host. An engineered biological system and associated method for performing a biological function are also disclosed.

    摘要翻译: 用于制造工程生物系统的技术包括在处于相应状态的同时确定要由工程生物系统执行的多个功能。 工程生物系统是基于由与每个状态相关联的生物密钥定义的对应的过渡触发的存在而在状态之间转换。 生成用于制造工程生物系统的状态机映射。 工程生物系统被验证并随后在宿主中激活。 还公开了一种用于进行生物功能的工程生物系统和相关方法。

    TECHNOLOGIES FOR MANAGING NETWORK PRIVILEGES BASED ON PHYSICAL PRESENCE
    53.
    发明申请
    TECHNOLOGIES FOR MANAGING NETWORK PRIVILEGES BASED ON PHYSICAL PRESENCE 有权
    基于物理存在管理网络特权的技术

    公开(公告)号:US20160191565A1

    公开(公告)日:2016-06-30

    申请号:US14583686

    申请日:2014-12-27

    IPC分类号: H04L29/06

    摘要: Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network infrastructure, determining whether the computing device is a member of the graft-network, and establishing initial network privileges for the computing device if the computing device is not a member, without direct programming of the member. The network privileges of members of the graft-network are updated over time as a function of the length of time for which the computing device is in physical presence of the network infrastructure. A computing device may be in physical presence of the network by physical contacting a communication bus of the network infrastructure or being within a limited communication range of the communication bus. New members to the graft-network may be quarantined to reduce risk to the network.

    摘要翻译: 用于管理移植网络的成员的网络特权的技术包括:在物理存在的情况下检测计算设备与网络基础结构,确定所述计算设备是所述移植网络的成员,以及如果所述计算设备,则为所述计算设备建立初始网络特权 设备不是会员,没有直接编程的会员。 随着时间的推移,移植网络的成员的网络特权被更新为计算设备在网络基础设施的物理存在中的时间长度的函数。 计算设备可以通过物理接触网络基础设施的通信总线或处于通信总线的受限通信范围内而处于网络的物理存在中。 移植网络的新成员可能被隔离,以降低网络的风险。

    SECURITY EVALUATION AND USER INTERFACE FOR APPLICATION INSTALLATION
    55.
    发明申请
    SECURITY EVALUATION AND USER INTERFACE FOR APPLICATION INSTALLATION 审中-公开
    安全评估和用户界面进行应用安装

    公开(公告)号:US20160162269A1

    公开(公告)日:2016-06-09

    申请号:US14558976

    申请日:2014-12-03

    IPC分类号: G06F9/445 G06F21/64

    摘要: Generally, this disclosure provides systems, devices, methods and computer readable media for application installation security and privacy evaluation and indication. The system may include an application installation module configured to receive an application package for installation on a device, wherein the package comprises a list of device resources to be accessed by the application. The system may also include memory configured to store an impact score table comprising one or more security impact scores, each security impact score associated with access to one of the device resources. The system may further include a security/privacy evaluation module configured to calculate a security impact indicator (SII) based on a sum of the security impact scores selected by the accessed device resources listed in the package.

    摘要翻译: 通常,本公开提供了用于应用安装安全性和隐私评估和指示的系统,设备,方法和计算机可读介质。 该系统可以包括被配置为接收用于在设备上安装的应用程序包的应用程序安装模块,其中该程序包包括应用程序要访问的设备资源的列表。 系统还可以包括被配置为存储包括一个或多个安全影响分数的影响分数表的存储器,每个安全影响分数与对设备资源之一的访问相关联。 该系统还可以包括安全/隐私评估模块,该安全/隐私评估模块被配置为基于由包中列出的所访问的设备资源选择的安全影响分数的总和来计算安全影响指示符(SII)。

    Method, apparatus and system for performing access control and intrusion detection on encrypted data
    56.
    发明授权
    Method, apparatus and system for performing access control and intrusion detection on encrypted data 有权
    用于对加密数据执行访问控制和入侵检测的方法,装置和系统

    公开(公告)号:US08024797B2

    公开(公告)日:2011-09-20

    申请号:US11317090

    申请日:2005-12-21

    IPC分类号: G06F11/00

    CPC分类号: H04L63/1416

    摘要: A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a partition on the computing platform. The partition may utilize Direct Memory Access (“DMA”) to access session key stored in system memory of a host operating system on the platform. The partition may thereafter utilize the session key to perform intrusion detection on encrypted data from the application running under the host operating system. Other embodiments may be described and claimed.

    摘要翻译: 一种方法,装置和系统启用对加密数据的访问控制和入侵检测。 具体来说,节点上的应用数据可以被路由到计算平台上的分区。 分区可以利用直接存储器访问(“DMA”)访问存储在平台上的主机操作系统的系统存储器中的会话密钥。 该分区此后可以利用会话密钥对来自在主机操作系统下运行的应用的加密数据进行入侵检测。 可以描述和要求保护其他实施例。

    USING TRAJECTORY FOR AUTHENTICATION
    57.
    发明申请
    USING TRAJECTORY FOR AUTHENTICATION 审中-公开
    使用TRAJECTORY进行认证

    公开(公告)号:US20110148633A1

    公开(公告)日:2011-06-23

    申请号:US12643190

    申请日:2009-12-21

    IPC分类号: G08B13/00

    摘要: An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior.

    摘要翻译: 认证系统基于在物理环境中的该设备的检测到的轨迹来认证设备。 该设备包括与分布在整个环境中的传感器进行通信的无线发射器。 随着设备在整个环境中移动,传感器将位置信息发送到认证系统。 认证系统跟踪设备的轨迹或动态位置,并根据设备的观测轨迹是否符合预测的轨迹或行为来认证设备。