🔍
Search Results - technology+classifications+%3e+computers%2c+electronics+%26+software+%3e+cybersecurity
4
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
A Secure Space System Data and Service Marketplace to Facilitate Trustworthy Coordination of Autonomous Space Vehicles: The Orbital Resilient Blockchain-enabled Interagent Transaction Service (ORBITS) Protocol
Unmet NeedAs of January 2021, there are approximately 6,542 satellites of which only 3,372 are operation in space (see Geospactialworld.net). Communication between satellites and other space systems is crucial for processes on Earth as well as in space to be conducted and a large number of industries depend on such activities. Satellites provide communication...
Published: 3/13/2026
|
Inventor(s):
Gregory Falco
,
Nathaniel Gordon
Keywords(s):
Category(s):
Technology Classifications > Computers, Electronics & Software > Cybersecurity
,
Technology Classifications > Computers, Electronics & Software > Algorithms
,
Technology Classifications > Engineering Tech > Energy, Infrastructure & Environment
Task Manager
Unmet Need:As personal medical information continues to be digitized, it is increasingly essential to implement safeguards for the protection of such information.Technology Overview:Inventors at Johns Hopkins have developed a digital survey software platform for touch-screen data entry forms with tablet devices. The system is wirelessly synchronized...
Published: 3/13/2026
|
Inventor(s):
David Newman-Toker
Keywords(s):
Category(s):
Technology Classifications > Computers, Electronics & Software > Cybersecurity
,
Technology Classifications > Computers, Electronics & Software > Electronic Medical Records
,
Technology Classifications > Computers, Electronics & Software > Healthcare IT
Architecture for Network Attack Resilient Intrusion Tolerant SCADA
Unmet Need:Today’s SCADA (supervisory control and data acquisition)systems use fault-tolerance techniques to remain available even when parts of the system fail. The systems can be restored after a few hours of downtime during a non-critical time, a tolerance that is considered acceptable today.However, as malicious attacks become more prevalent, SCADA...
Published: 3/12/2026
|
Inventor(s):
Yair Amir
,
Thomas Tantillo
,
Amy Babay
Keywords(s):
Computer and Network Systems
,
Computer Software
,
Computing; Calculating; Counting
,
Database Management Software
,
Electrical Digital Data Processing
,
Physics
Category(s):
Technology Classifications > Computers, Electronics & Software > Healthcare IT
,
Technology Classifications > Computers, Electronics & Software
,
Technology Classifications > Computers, Electronics & Software > Cybersecurity
Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing
An efficient and practical method for dynamically maintaining an authenticated dictionary uses a skip list data structure and communicative hash functions to provide a dictionary database (201) that stores information objects so that any individual object can be authenticated as belonging or not belonging to the dictionary. The authentication consists...
Published: 3/12/2026
|
Inventor(s):
Roberto Tamassia
,
Michael Goodrich
Keywords(s):
Arrangements for Secret or Secure Communication
,
Computing; Calculating; Counting
,
Electric Communication Technique
,
Electrical Digital Data Processing
,
Electricity
,
Physics
,
Transmission of Digital Information
Category(s):
Technology Classifications > Computers, Electronics & Software > Cybersecurity
,
Technology Classifications > Computers, Electronics & Software > Healthcare IT
,
Technology Classifications > Industrial Tech > Energy, Infrastructure & Environment
,
Technology Classifications > Computers, Electronics & Software
,
Technology Classifications > Industrial Tech
JHTV Home
|
Search
|
Login/Subscribe
2017 - 2022 © Johns Hopkins Technology Ventures. All Rights Reserved. Powered by
Inteum