Abstract:
A two-sided flow-through immunoassay testing device is provided. The device comprises a well having therein a plurality of orifices, the plurality of orifices serving to channel biologic material deposited into the well onto different immunoassay pods, wherein the immunoassay pods may contain immunoassay test layers stacked to create an immunoassay test. The device further includes a results window. Inside the device, and between the window and the pods, there are open sections below each pod to allow a user to view the results of the tests as presented on the reaction layers of the pods through the window.
Abstract:
Various examples of methods and systems are provided for an attack detection system that can detect attacks in big data systems. The attack detection system can include security modules coupled to data nodes of the big data system. The attack detection system can identify a process executing on the respective data node. A process signature can be generated for the process executing on the data node. A determination of whether a big data system is being attacked can be based at least in part on a comparison of the process signature with at least one other process signature for the same process executing on another security module. The other process signatures are received via secure communication from the other security module.
Abstract:
Una invención orientada a mantener en forma secreta e indescifrable cualquier tipo de datos o información que pueda ser almacenada, transmitida, desplegada o expresada por cualquier medio o formato, independientemente de cual sea su contenido u objeto y mantener la información original inaccesible a personas no autorizadas, mediante un procedimiento, proceso o técnica de criptografía para un cifrado de amplia aplicación física (hardware), lógica (software), mixta (firmware) y otras formas que puedan crearse en el futuro. Esta invención que se protege define una técnica o proceso para generar múltiples algoritmos de encriptación de amplia aplicación industrial tanto en sectores privados como públicos en las áreas de defensa nacional, telecomunicaciones, informática, programas de ordenador, transacciones bancarias y de pagos electrónicos, criptografía de imágenes fijas, en movimiento y sonidos, en su almacenamiento o transmisión; incluyendo pero no limitada a las áreas detalladas, siendo este listado ilustrativo y no limitativo.
Abstract:
A value corresponding to an input for a cryptographic operation may be received. The value may be masked by multiplying the value with a first number modulo a prime number. The cryptographic operation may subsequently be performed on the masked value.
Abstract:
Various exemplary embodiments relate to a method, network node, and non- transitory machine-readable storage medium including one or more of the following: receiving, at the network device, an ownership indication that a first network processor is currently serving an anti-replay connection; and in response to receiving the ownership indication, effecting a presetting in a second network processor of a current sequence number (SN) for the anti-replay connection to a first value that is greater than or equal to a re-key threshold value, wherein the network device includes at least one of the first network processor and the second network processor wherein the re-key threshold value is a value beyond which an SN triggers re-keying of the anti-replay connection, and wherein the second network processor utilizes the current sequence number upon beginning to serve the anti-replay connection.
Abstract:
A variety of methods and arrangements for sharing medical data are described. In one aspect, one or more data streams are received from one or more medical imaging/sensing or other types of devices. Frames are obtained from the streams. In some embodiments, particular frames and/or parts of frames are selectively encrypted. The frames are transmitted to a remote device, where they are rendered and/or displayed at the remote device. In various embodiments, the frames of different streams are synchronized.
Abstract:
A secure mobile application connection bus is disclosed. First encryption information and an identifier associated with a data storage location on a mobile device are provided from a first application to a second application. Second encryption information associated with the second mobile application is retrieved from the data storage location. The second mobile application is configured to provide data to the data storage location. Data is transferred securely between the first mobile application and the second mobile application via the data storage location.
Abstract:
A method for online authentication includes receiving (205, 206, 203) membership authenticating information specific to members of a particular affiliation from the members and from one or more remote databases. The information is aggregated and stored (202) in an aggregate database. An individual is authenticated (216, 217, 218A), via a widget at least one of integrated into, and accessible by, at least one of a mobile application and a website of a provider of at least one of a particular program and a particular service, as a member of the particular affiliation based on a comparison of authenticating indicia provided online by the individual and the information stored in at least one of the aggregate database and the remote databases. Digital credentials are provided (212) to the individual for access to the at least one of the particular program and the particular service when the individual is authenticated. The credentials include a unique identifier, a login and password.
Abstract:
The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information used by a KMF to regenerate a key is stored. A start_interception message is signaled from an ADMF to a CSCF. A halt_message is signaled from the ADMF to the CSCF.