Adversarial Learning for Hiding Wireless Signals
Provides a novel method for ensuring sensitive messages are secure from malicious intrusion on wireless networks.
Background:
Spectrum access is required to communicate between two mobile nodes in a wireless network, where the communication link can be intercepted or jammed by adversaries due to the inherent broadcast nature of the wireless channel....
Published: 5/1/2024
|
Inventor(s): Dola Saha, Hesham Mohammed
Keywords(s): Technologies
Category(s): Technology Classifications > Wireless Technologies, Campus > University at Albany
|
Advanced Mobile Navigation and Mapping App
Improves mobile mapping and navigation apps by visualizing distant landmarks that typically fall outside the device display area.
Background:
Existing mobile map or navigation apps generally provide directions through distance and turn-by-turn instructions – for example, “after 1 mile, turn right on to Lakeview street.” Directions...
Published: 1/23/2024
|
Inventor(s): Rui Li, Jiayan Zhao
Keywords(s): augmented reality, autonomous vehicle, spatial cognition, Technologies, visualization, wayfinding and navigation
Category(s): Campus > University at Albany, Technology Classifications > Electronics, Technology Classifications > Instrumentation, Technology Classifications > Wireless Technologies
|
Wireless Charger
Provides simultaneous charging on all sides of the device to reduce charging time.
Background:
Wireless charging of electronic products such as mobile devices is an area of significant interest and research. Unfortunately, challenges have stunted the growth of the wireless charging industry. For example, many so-called “wireless” charging...
Published: 5/1/2024
|
Inventor(s): Patanjali Parimi, Mohammed Hossain
Keywords(s): #SUNYresearch, drones, TAF, Technologies
Category(s): Technology Classifications > Wireless Technologies, Campus > SUNY Oswego
|
RFEye in the Sky
Locates signals independent of the waveform, via a single Unmanned Aerial Vehicle (UAV) equipped with only one omnidirectional antenna.
Background:
Locating wireless signals outdoors is necessary for a variety of military, law enforcement, and civil applications. Acquiring such signals is the first step, which often requires patrolling large distances...
Published: 5/7/2024
|
Inventor(s): Dola Saha, Aveek Dutta, Maqsood Abdul Careem
Keywords(s): beamforming, blind detection, direction of arrival, localization, Technologies, UAV
Category(s): Campus > University at Albany, Technology Classifications > Electronics, Technology Classifications > Wireless Technologies
|
Air Filter for Face Masks
Battery-operated air filtration system for face masks that kills viruses on contact.
Background:
Face masks protect wearers via fabric layers, which mechanically block large droplets, and electrostatic layers, which trap small, airborne particles carrying viruses. The electrostatic layers lose their charge after a single day, reducing effectiveness....
Published: 5/1/2024
|
Inventor(s): Iulian Gherasoiu, Haralabos Efstathiadis, Michael Fasullo
Keywords(s): battery-operated, COVID-19, electrostatic field, face masks, replacement for N95, reusable filter
Category(s): Campus > SUNY Polytechnic Institute, Technology Classifications > COVID-19, Technology Classifications > Wireless Technologies, Technology Classifications > Medical Devices
|
ODD: Protecting Sensitive Data in Mobile Devices by Out-of-order Data Division
A novel, multi-layer distributed data security scheme that provides a triple layer of out-of-order divide and store protection of data
Background:
Technologists are looking to achieve a balance between making data difficult to be illegally or maliciously compromised while providing legitimate data users and owners sufficient encryption protection...
Published: 8/3/2021
|
Inventor(s): Yu Chen
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
|
Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor
A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty
Background:
The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 12/29/2023
|
Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
|
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes.
Background:
A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 4/10/2023
|
Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
|
System and Method for Validating Program Execution at Run-Time
A technology that enables the detection of tampering of a program as the program executes for security applications.
Background:
Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 7/22/2024
|
Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
|
Authentication of Remotely Executed Program
A mechanism for authenticating remote executions on a server in a distributed environment, validating what is executed at the server on behalf of the client
Background:
As distributed systems become pervasive, security mechanisms have to be geared up to meet the increasing threats against such systems. For grid computing and other systems to...
Published: 7/27/2023
|
Inventor(s): Kanad Ghose
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Wireless Technologies, Technology Classifications > Computers, Campus > Binghamton University
|