-
公开(公告)号:US20240106797A1
公开(公告)日:2024-03-28
申请号:US18242795
申请日:2023-09-06
Applicant: CUPP Computing AS
Inventor: Shlomo Touboul
IPC: H04L9/40 , G06F21/57 , H04W12/12 , H04W12/128
CPC classification number: H04L63/0209 , G06F21/57 , H04W12/12 , H04W12/128 , H04L63/0227 , H04W12/08
Abstract: Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.
-
公开(公告)号:US11775644B2
公开(公告)日:2023-10-03
申请号:US17222841
申请日:2021-04-05
Applicant: CUPP Computing AS
Inventor: Ami Oz , Shlomo Touboul
IPC: G06F21/57 , H04W12/062 , H04W12/06 , H04L9/40 , G06F1/3209 , G06F21/56 , G06F8/61
CPC classification number: G06F21/57 , G06F1/3209 , G06F21/56 , H04L63/14 , H04L63/1408 , H04L63/20 , H04W12/06 , H04W12/062 , G06F8/62 , G06F2221/034 , H04L63/0227 , H04L63/0245 , H04L63/1425
Abstract: Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.
-
公开(公告)号:US20230252142A1
公开(公告)日:2023-08-10
申请号:US17959708
申请日:2022-10-04
Applicant: CUPP Computing AS
Inventor: Shlomo Touboul
IPC: G06F21/56 , H04L9/40 , H04W12/128 , H04W12/00 , H04W12/12
CPC classification number: G06F21/562 , H04L63/1441 , H04L63/1416 , H04W12/128 , H04L63/20 , H04L63/02 , H04W12/00 , H04W12/12 , H04L63/0263 , H04L63/145
Abstract: A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.
-
公开(公告)号:US11599650B2
公开(公告)日:2023-03-07
申请号:US17217064
申请日:2021-03-30
Applicant: CUPP Computing AS
Inventor: Omar Nathaniel Ely
Abstract: A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.
-
公开(公告)号:US20210152558A1
公开(公告)日:2021-05-20
申请号:US17158870
申请日:2021-01-26
Applicant: CUPP Computing AS
Inventor: Shlomo Touboul
Abstract: Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.
-
6.
公开(公告)号:US10999302B2
公开(公告)日:2021-05-04
申请号:US16573620
申请日:2019-09-17
Applicant: CUPP Computing AS
Inventor: Shlomo Touboul
Abstract: A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.
-
公开(公告)号:US10742663B2
公开(公告)日:2020-08-11
申请号:US16601466
申请日:2019-10-14
Applicant: CUPP Computing AS
Inventor: Ami Oz , Shlomo Touboul
Abstract: Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.
-
公开(公告)号:US20200045060A1
公开(公告)日:2020-02-06
申请号:US16601399
申请日:2019-10-14
Applicant: CUPP Computing AS
Inventor: Ami Oz , Shlomo Touboul
IPC: H04L29/06 , G06F21/57 , G06F1/3209 , G06F21/56 , H04W12/06
Abstract: Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.
-
公开(公告)号:US10417421B2
公开(公告)日:2019-09-17
申请号:US16144408
申请日:2018-09-27
Applicant: CUPP Computing AS
Inventor: Shlomo Touboul
Abstract: A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.
-
公开(公告)号:US10404660B2
公开(公告)日:2019-09-03
申请号:US14520314
申请日:2014-10-21
Applicant: CUPP Computing AS
Inventor: Shlomo Touboul
Abstract: Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.
-
-
-
-
-
-
-
-
-