Search Results - technology+classifications+%3e+software+%26+information+technology+%3e+security

6 Results Sort By:
Systems and Methods for Identity Authentication using the Keystroke Dynamics of a Single Interaction Session
This technology is a method of detecting an online impostor using keystroke dynamics without requiring prior collection of behavioral data from the true user. Background: Keystroke dynamics is an area of behavioral biometrics that attempts to identify or authenticate a user by collecting data about how a user types, such as the length of time between...
Published: 7/15/2022   |   Inventor(s): Joseph Valacich, Jeffrey Jenkins
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet
Road to War Web Application
This invention is software designed for the US Army to effectively train Non-Commissioned Officers (NCOs) in-person or remotely in a variety of situations. The application leverages an AI-based reactive unit structure and operational environment to teach leadership skills on a virtual unit comprised of reactive virtual soldier bots. Background: The...
Published: 7/15/2022   |   Inventor(s): Jason Denno
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security
Domain Transferable Neural Network Architecture for Fact Verification
The problem this invention solves is that of spurious patterns or invalid results from software neural networks tasked to use natural language programming for fact verification in news or articles. This approach increases the accuracy of fact verification. Neural architectures with improved transfer between domains enables re-use of trained models,...
Published: 1/26/2023   |   Inventor(s): Mithun Paul, Mihai Surdeanu, Sandeep Suntwal, Rebecca Sharp
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security, Technology Classifications > Software & Information Technology > Web & Internet, Technology Classifications > Software & Information Technology > Databases & Data Mining
Cyber Virtual Learning Environment (VLE) and CyberApolis
The Cyber Virtual Learning Environment (VLE) is a hybrid cloud-based training platform designed to deliver the infrastructure necessary to allow students to conduct performance-based assessments utilizing several interactive applications and CyberApolis virtual world. CyberApolis is an unstructured synthetic live environment designed to replicate the...
Published: 7/15/2022   |   Inventor(s): Jason Denno, Romi Carrell Wittman
Keywords(s):  
Category(s): Technology Classifications > Software & Information Technology > Security
MultiLock: Biometric-Based Graded Authentication for Mobile Devices
MultiLock is a passive, graded, smart phone security system which runs in the background and reviews user interaction during a screen session to continuously verify user security. The system increases security level access as warranted during the session to reduce user unproductive time with security verification. This technology improves smart phone...
Published: 7/15/2022   |   Inventor(s): Christopher Gniady, Shravan Aras, Hari Venugopalan
Keywords(s):  
Category(s): Technology Classifications > Engineering & Physical Sciences > Communications & Networking > Wireless, Technology Classifications > Software & Information Technology > Communications & Networking, Technology Classifications > Software & Information Technology > Mobile Application, Technology Classifications > Software & Information Technology > Security
Embodied Conversational Agent-Based Kiosk for Automated Interviewing
This technology is a complete system for automated interviewing suitable for credibility assessments and rapid screening. The system is completely integrated into either a standing or tabletop kiosk. Unlike current embodied conversational agent kiosks, this proposed ECA kiosk is equipped with behavioral and psychophysiological sensors such as: Vocal...
Published: 7/15/2022   |   Inventor(s): Jay Nunamaker, Jr., Judee Burgoon, Aaron Elkins, Mark Patton, Douglas Derrick, Kevin Moffitt
Keywords(s): artificial intelligence, behavioral sensors, credibility assessment, deception detection, embodied conversational agent, physiological sensors, rapid screening, sensor fusion
Category(s): Technology Classifications > Software & Information Technology, Technology Classifications > Software & Information Technology > Security