G06F21/70

Personal health and environmental monitoring device and method

When it comes to monitoring human health, today's consumers are limited to so called “health trackers,” which count steps and calculate calorie burns. Traditional health trackers are only capable of measuring heart rate and are limited to external measurements. These devices are not capable of obtaining the internal body data and do not have access to human fluids. The personal health shield personal cloud case cover (or “health PCCC”) can not only analyze human fluids but also fluids being consumed by the user (food and drinks). The data collected from the fluids is then compared to a cloud or local data base. The results are displayed on a phone, tablet, personal computers, television, or any other device either mounted in the PCCC or connected to the health PCCC.

Personal health and environmental monitoring device and method

When it comes to monitoring human health, today's consumers are limited to so called “health trackers,” which count steps and calculate calorie burns. Traditional health trackers are only capable of measuring heart rate and are limited to external measurements. These devices are not capable of obtaining the internal body data and do not have access to human fluids. The personal health shield personal cloud case cover (or “health PCCC”) can not only analyze human fluids but also fluids being consumed by the user (food and drinks). The data collected from the fluids is then compared to a cloud or local data base. The results are displayed on a phone, tablet, personal computers, television, or any other device either mounted in the PCCC or connected to the health PCCC.

CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION
20230134122 · 2023-05-04 ·

Methods and systems for continuously and quantitatively assessing the risk to data confidentiality, integrity, and availability on identified on endpoints, servers, medical devices, and “Internet of things” devices in a networked healthcare environment monitor resource requests by user applications running on the various device. A map of resource usage by each application may be generated. Based on the map and a risk model (e.g., the contents of a risk database), application events associated with risks are detected and resources vulnerable to the risk may be identified.

CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION
20230134122 · 2023-05-04 ·

Methods and systems for continuously and quantitatively assessing the risk to data confidentiality, integrity, and availability on identified on endpoints, servers, medical devices, and “Internet of things” devices in a networked healthcare environment monitor resource requests by user applications running on the various device. A map of resource usage by each application may be generated. Based on the map and a risk model (e.g., the contents of a risk database), application events associated with risks are detected and resources vulnerable to the risk may be identified.

Inhibiting a penetration attack
11687680 · 2023-06-27 · ·

A technique includes providing a security monitor to at least detect a penetration attack on a circuit assembly that contains the security monitor. The technique includes inhibiting success of the penetration attack, including flexibly mounting the security monitor to the circuit assembly to allow the security monitor to move in response to the security monitor being contacted during the penetration attack.

Inhibiting a penetration attack
11687680 · 2023-06-27 · ·

A technique includes providing a security monitor to at least detect a penetration attack on a circuit assembly that contains the security monitor. The technique includes inhibiting success of the penetration attack, including flexibly mounting the security monitor to the circuit assembly to allow the security monitor to move in response to the security monitor being contacted during the penetration attack.

Semiconductor memory device, chip ID generation method thereof and manufacturing method thereof

A semiconductor memory device includes programmable resistance memory cells and a controller which applies a forming pulse to first and second groups of the programmable resistance memory cells for inducing a change in the first group from an initial resistance range to an intermediate resistance range, and for inducing the second group having a resistance outside the intermediate range. When a forming rate is lower than a first forming threshold rate, the controller adjusts the forming pulse until the forming rate is higher than the first forming threshold rate. When a forming rate is higher than the first forming threshold rate but lower than a second forming threshold rate, the controller adjusts the forming pulse until the forming rate is higher than the second forming threshold rate. The controller applies a programming pulse to the first and second groups and generates a chip ID of the semiconductor memory device.

COMPUTING SYSTEMS AND METHODS

A security device for a local computer, said security device comprising a locked-down system environment that includes a remote-access connector and an authenticator facility. The remote-access connector initiates a remote connection request with a virtual-computer service. The authenticator facility provides first authentication-data to the remote-access connector for ensuring that the security device has permission to be allocated a virtual computer from the virtual-computer service.

COMPUTING SYSTEMS AND METHODS

A security device for a local computer, said security device comprising a locked-down system environment that includes a remote-access connector and an authenticator facility. The remote-access connector initiates a remote connection request with a virtual-computer service. The authenticator facility provides first authentication-data to the remote-access connector for ensuring that the security device has permission to be allocated a virtual computer from the virtual-computer service.

RELIABILITY ENHANCEMENT METHODS FOR PHYSICALLY UNCLONABLE FUNCTION BITSTRING GENERATION
20170364709 · 2017-12-21 ·

A Hardware-Embedded Delay Physical Unclonable Function (“HELP PUF”) leverages entropy by monitoring path stability and measuring path delays from core logic macros. Reliability and security enhancing techniques for the HELP PUF reduce bit flip errors during regeneration of the bitstring across environmental variations and improve cryptographic strength along with the corresponding difficulty of carrying out model building attacks. A voltage-based enrollment process screens unstable paths on normally synthesized (glitchy) functional units and reduces bit flip errors by carrying out enrollment at multiple supply voltages controlled using on-chip voltage regulators.