Cupp Computing AS

Norway

Back to Profile

1-71 of 71 for Cupp Computing AS Sort by
Query
Aggregations
Jurisdiction
        United States 67
        World 4
Date
New (last 4 weeks) 1
2025 August (MTD) 1
2025 (YTD) 3
2024 6
2023 2
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 39
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 24
H04L 9/40 - Network security protocols 16
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 15
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities 15
See more
Status
Pending 2
Registered / In Force 69
Found results for  patents

1.

SECURE COMPUTING SYSTEM

      
Application Number 19026142
Status Pending
Filing Date 2025-01-16
First Publication Date 2025-08-14
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

2.

Secure computing system

      
Application Number 18624858
Grant Number 12299147
Status In Force
Filing Date 2024-04-02
First Publication Date 2025-03-13
Grant Date 2025-05-13
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

3.

Systems and methods for providing security services during power management mode

      
Application Number 18624818
Grant Number 12314396
Status In Force
Filing Date 2024-04-02
First Publication Date 2025-02-20
Grant Date 2025-05-27
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 1/3209 - Monitoring remote activity, e.g. over telephone lines or network connections
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols
  • H04W 12/06 - Authentication
  • H04W 12/062 - Pre-authentication
  • G06F 8/61 - Installation

4.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 18243246
Grant Number 12255926
Status In Force
Filing Date 2023-09-07
First Publication Date 2024-08-01
Grant Date 2025-03-18
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

5.

Transaction security systems and methods

      
Application Number 18242810
Grant Number 12301574
Status In Force
Filing Date 2023-09-06
First Publication Date 2024-07-25
Grant Date 2025-05-13
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

6.

System and method for implementing content and network security inside a chip

      
Application Number 18242795
Grant Number 12192170
Status In Force
Filing Date 2023-09-06
First Publication Date 2024-03-28
Grant Date 2025-01-07
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 9/40 - Network security protocols
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
  • H04W 12/08 - Access security

7.

Systems and methods for providing network security using a secure digital device

      
Application Number 18239515
Grant Number 12034772
Status In Force
Filing Date 2023-08-29
First Publication Date 2024-02-08
Grant Date 2024-07-09
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

8.

Secure computing system

      
Application Number 18118550
Grant Number 11947688
Status In Force
Filing Date 2023-03-07
First Publication Date 2024-02-01
Grant Date 2024-04-02
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

9.

Systems and methods for providing security services during power management mode

      
Application Number 18376331
Grant Number 11947674
Status In Force
Filing Date 2023-10-03
First Publication Date 2024-01-25
Grant Date 2024-04-02
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

A method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 1/3209 - Monitoring remote activity, e.g. over telephone lines or network connections
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/06 - Authentication
  • H04W 12/062 - Pre-authentication
  • G06F 8/61 - Installation

10.

System and method for providing network security to mobile devices

      
Application Number 17959708
Grant Number 11822653
Status In Force
Filing Date 2022-10-04
First Publication Date 2023-08-10
Grant Date 2023-11-21
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 12/12 - Detection or prevention of fraud

11.

SYSTEM AND METHOD FOR PROVIDING NETWORK SECURITY TO MOBILE DEVICES

      
Application Number 17980841
Status Pending
Filing Date 2022-11-04
First Publication Date 2023-03-09
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 12/12 - Detection or prevention of fraud

12.

Systems and methods for providing network security using a secure digital device

      
Application Number 17729895
Grant Number 11743297
Status In Force
Filing Date 2022-04-26
First Publication Date 2022-08-11
Grant Date 2023-08-29
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

13.

System and method for implementing content and network security inside a chip

      
Application Number 17362412
Grant Number 11757835
Status In Force
Filing Date 2021-06-29
First Publication Date 2022-05-26
Grant Date 2023-09-12
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 9/40 - Network security protocols
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security

14.

System and method for providing data and device security between external and host devices

      
Application Number 17307899
Grant Number 11652829
Status In Force
Filing Date 2021-05-04
First Publication Date 2022-05-19
Grant Date 2023-05-16
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

15.

Systems and methods for providing real time security and access monitoring of a removable media device

      
Application Number 17348480
Grant Number 11604861
Status In Force
Filing Date 2021-06-15
First Publication Date 2022-05-12
Grant Date 2023-03-14
Owner CUPP Computing AS (Norway)
Inventor
  • Touboul, Shlomo
  • Ferdman, Sela
  • Yusim, Yonathan

Abstract

A method comprises detecting a removable media device being coupled to an external device port of a digital device having an operating system and a file system, authenticating a password to access the removable media device, causing redirection code to be temporarily generated on the digital device, intercepting with the redirection code a data request, determining to allow the data request based on a security policy, allowing the operating system or file system to provide the data based on the determination, detecting the removable media device being removed from the digital device; and terminating the at least a portion of the redirection code.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • H04L 9/40 - Network security protocols
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

16.

Secure computing system

      
Application Number 17217064
Grant Number 11599650
Status In Force
Filing Date 2021-03-30
First Publication Date 2022-02-17
Grant Date 2023-03-07
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

17.

Systems and methods for providing digital content marketplace security

      
Application Number 17510016
Grant Number 12380476
Status In Force
Filing Date 2021-10-25
First Publication Date 2022-02-10
Grant Date 2025-08-05
Owner Cupp Computing AS (Norway)
Inventor
  • Touboul, Shlomo
  • Kaplan, Mark

Abstract

A digital content marketplace filter engine may be configured to identify a communication between a digital content marketplace client and a digital content marketplace server. An analysis engine may be configured to review the communication against a digital content marketplace policy. A response engine configured to block, allow or modify the communication to conform to the digital content marketplace policy.

IPC Classes  ?

  • G06Q 30/0601 - Electronic shopping [e-shopping]
  • H04W 12/08 - Access security
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications

18.

Systems and methods for providing security services during power management mode

      
Application Number 17222841
Grant Number 11775644
Status In Force
Filing Date 2021-04-05
First Publication Date 2021-07-22
Grant Date 2023-10-03
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/062 - Pre-authentication
  • H04W 12/06 - Authentication
  • H04L 9/40 - Network security protocols
  • G06F 1/3209 - Monitoring remote activity, e.g. over telephone lines or network connections
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 8/61 - Installation

19.

Transaction security systems and methods

      
Application Number 17158870
Grant Number 11757885
Status In Force
Filing Date 2021-01-26
First Publication Date 2021-05-20
Grant Date 2023-09-12
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

20.

System and method for providing network security to mobile devices

      
Application Number 16950655
Grant Number 11461466
Status In Force
Filing Date 2020-11-17
First Publication Date 2021-05-13
Grant Date 2022-10-04
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 12/12 - Detection or prevention of fraud

21.

Systems and methods for providing network security using a secure digital device

      
Application Number 16883785
Grant Number 11316905
Status In Force
Filing Date 2020-05-26
First Publication Date 2021-04-22
Grant Date 2022-04-26
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

22.

Secure computing system

      
Application Number 16701403
Grant Number 10963577
Status In Force
Filing Date 2019-12-03
First Publication Date 2020-04-02
Grant Date 2021-03-30
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

23.

System and method for providing network security to mobile devices

      
Application Number 16656358
Grant Number 10621344
Status In Force
Filing Date 2019-10-17
First Publication Date 2020-02-20
Grant Date 2020-04-14
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity

24.

Systems and methods for providing security services during power management mode

      
Application Number 16601466
Grant Number 10951632
Status In Force
Filing Date 2019-10-14
First Publication Date 2020-02-06
Grant Date 2021-03-16
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 1/3209 - Monitoring remote activity, e.g. over telephone lines or network connections
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/61 - Installation

25.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 16601408
Grant Number 10951659
Status In Force
Filing Date 2019-10-14
First Publication Date 2020-02-06
Grant Date 2021-03-16
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

26.

System and method for providing data and device security between external and host devices

      
Application Number 16573620
Grant Number 10999302
Status In Force
Filing Date 2019-09-17
First Publication Date 2020-01-23
Grant Date 2021-05-04
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

27.

System and method for providing network security to mobile devices

      
Application Number 16573877
Grant Number 10839075
Status In Force
Filing Date 2019-09-17
First Publication Date 2020-01-23
Grant Date 2020-11-17
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity

28.

Systems and methods for providing real time security and access monitoring of a removable media device

      
Application Number 16573028
Grant Number 11036836
Status In Force
Filing Date 2019-09-17
First Publication Date 2020-01-09
Grant Date 2021-06-15
Owner CUPP Computing AS (Norway)
Inventor
  • Touboul, Shlomo
  • Ferdman, Sela
  • Yusim, Yonathan

Abstract

In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable media device, injecting redirection code into the digital device, intercepting, with the redirection code, a request for data, determining to allow the request for data based on a security policy, and providing the data based on the determination. The method may further comprise selecting the security policy from a plurality of security policies based, at least in part, on the password and/or filtering the content of the requested data. Filtering the content may comprise scanning the data for malware. Filtering the content may also comprise scanning the data for confidential information.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

29.

Transaction security systems and methods

      
Application Number 16551200
Grant Number 10904254
Status In Force
Filing Date 2019-08-26
First Publication Date 2019-12-12
Grant Date 2021-01-26
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

30.

Secure computing system

      
Application Number 16230508
Grant Number 10496834
Status In Force
Filing Date 2018-12-21
First Publication Date 2019-09-12
Grant Date 2019-12-03
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

31.

Systems and methods for providing security services during power management mode

      
Application Number 16404408
Grant Number 11449613
Status In Force
Filing Date 2019-05-06
First Publication Date 2019-08-22
Grant Date 2022-09-20
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 1/3209 - Monitoring remote activity, e.g. over telephone lines or network connections
  • H04W 12/062 - Pre-authentication
  • H04W 12/06 - Authentication
  • H04L 9/40 - Network security protocols
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 8/61 - Installation

32.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 16404429
Grant Number 10904293
Status In Force
Filing Date 2019-05-06
First Publication Date 2019-08-22
Grant Date 2021-01-26
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

33.

System and method for implementing content and network security inside a chip

      
Application Number 16389886
Grant Number 11050712
Status In Force
Filing Date 2019-04-19
First Publication Date 2019-08-08
Grant Date 2021-06-29
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/128 - Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security

34.

Systems and methods for providing network security using a secure digital device

      
Application Number 16299087
Grant Number 10666688
Status In Force
Filing Date 2019-03-11
First Publication Date 2019-07-04
Grant Date 2020-05-26
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

35.

System and method for providing network security to mobile devices

      
Application Number 16144408
Grant Number 10417421
Status In Force
Filing Date 2018-09-27
First Publication Date 2019-01-24
Grant Date 2019-09-17
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • H04W 12/12 - Detection or prevention of fraud

36.

System and method for providing data and device security between external and host devices

      
Application Number 16101240
Grant Number 10567403
Status In Force
Filing Date 2018-08-10
First Publication Date 2019-01-03
Grant Date 2020-02-18
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

37.

Systems and methods for providing security services during power management mode

      
Application Number 16022127
Grant Number 10404722
Status In Force
Filing Date 2018-06-28
First Publication Date 2018-11-08
Grant Date 2019-09-03
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 1/3209 - Monitoring remote activity, e.g. over telephone lines or network connections
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04W 12/06 - Authentication
  • G06F 8/61 - Installation

38.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 16006597
Grant Number 10284603
Status In Force
Filing Date 2018-06-12
First Publication Date 2018-10-18
Grant Date 2019-05-07
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

39.

System and method for providing network security to mobile devices

      
Application Number 15689795
Grant Number 10089462
Status In Force
Filing Date 2017-08-29
First Publication Date 2018-08-09
Grant Date 2018-10-02
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

40.

Secure computing system

      
Application Number 15707936
Grant Number 10162975
Status In Force
Filing Date 2017-09-18
First Publication Date 2018-08-09
Grant Date 2018-12-25
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

41.

Transaction security systems and methods

      
Application Number 15924108
Grant Number 10397227
Status In Force
Filing Date 2018-03-16
First Publication Date 2018-07-26
Grant Date 2019-08-27
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

42.

Systems and methods for providing network security using a secure digital device

      
Application Number 15701365
Grant Number 10291656
Status In Force
Filing Date 2017-09-11
First Publication Date 2018-07-19
Grant Date 2019-05-14
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

43.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 15653376
Grant Number 10057295
Status In Force
Filing Date 2017-07-18
First Publication Date 2018-05-31
Grant Date 2018-08-21
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • G06F 9/00 - Arrangements for program control, e.g. control units
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

44.

System and method for providing data and device security between external and host devices

      
Application Number 15636578
Grant Number 10313368
Status In Force
Filing Date 2017-06-28
First Publication Date 2018-05-24
Grant Date 2019-06-04
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

45.

System and method for providing data and device security between external and host devices

      
Application Number 15636536
Grant Number 10419459
Status In Force
Filing Date 2017-06-28
First Publication Date 2017-10-12
Grant Date 2019-09-17
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • G06F 13/38 - Information transfer, e.g. on bus
  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

46.

Systems and methods for providing security services during power management mode

      
Application Number 15599352
Grant Number 10084799
Status In Force
Filing Date 2017-05-18
First Publication Date 2017-09-07
Grant Date 2018-09-25
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

47.

Systems and methods for providing security services during power management mode

      
Application Number 15371164
Grant Number 09843595
Status In Force
Filing Date 2016-12-06
First Publication Date 2017-08-31
Grant Date 2017-12-12
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • G06F 1/32 - Means for saving power
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/445 - Program loading or initiating

48.

System and method for providing network security to mobile devices

      
Application Number 15586176
Grant Number 09747444
Status In Force
Filing Date 2017-05-03
First Publication Date 2017-08-17
Grant Date 2017-08-29
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud

49.

System and method for providing network security to mobile devices

      
Application Number 15352553
Grant Number 09781164
Status In Force
Filing Date 2016-11-15
First Publication Date 2017-08-10
Grant Date 2017-10-03
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

50.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 15201309
Grant Number 09756079
Status In Force
Filing Date 2016-07-01
First Publication Date 2017-06-01
Grant Date 2017-09-05
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • G06F 9/00 - Arrangements for program control, e.g. control units
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

51.

Systems and methods for providing security services during power management mode

      
Application Number 14707853
Grant Number 09516040
Status In Force
Filing Date 2015-05-08
First Publication Date 2015-09-24
Grant Date 2016-12-06
Owner CUPP COMPUTING AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

52.

SYSTEMS AND METHODS FOR PROVIDING NETWORK SECURITY USING A SECURE DIGITAL DEVICE

      
Application Number US2015015970
Publication Number 2015/123611
Status In Force
Filing Date 2015-02-13
Publication Date 2015-08-20
Owner
  • CUPP COMPUTING AS (Norway)
  • SOCKOL, Marc A. (USA)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

53.

Systems and methods for providing network security using a secure digital device

      
Application Number 14622764
Grant Number 09762614
Status In Force
Filing Date 2015-02-13
First Publication Date 2015-08-13
Grant Date 2017-09-12
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A system may include a traffic interception module configured to intercept network traffic of a host device. A traffic virtualization module may be configured to generate a virtual file on the host device containing the intercepted network traffic. A security system interface module may be configured to provide the virtual file to a secure digital security system over a virtualized file interface coupling the host device to the secure digital security system, and to receive instructions to allow or to deny the network traffic from the secure digital security system over the virtualized file interface. A traffic access management module may be configured to allow or to deny the network traffic based on the instructions.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

54.

System and method for implementing content and network security inside a chip

      
Application Number 14520314
Grant Number 10541969
Status In Force
Filing Date 2014-10-21
First Publication Date 2015-07-30
Grant Date 2020-01-21
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security

55.

Systems and methods for providing real time security and access monitoring of a removable media device

      
Application Number 14337101
Grant Number 10417400
Status In Force
Filing Date 2014-07-21
First Publication Date 2015-02-12
Grant Date 2019-09-17
Owner CUPP Computing AS (Norway)
Inventor
  • Touboul, Shlomo
  • Ferdman, Sela
  • Yusim, Yonathan

Abstract

In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable media device, injecting redirection code into the digital device, intercepting, with the redirection code, a request for data, determining to allow the request for data based on a security policy, and providing the data based on the determination. The method may further comprise selecting the security policy from a plurality of security policies based, at least in part, on the password and/or filtering the content of the requested data. Filtering the content may comprise scanning the data for malware. Filtering the content may also comprise scanning the data for confidential information.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

56.

Systems and methods for providing digital content marketplace security

      
Application Number 14326387
Grant Number 11157976
Status In Force
Filing Date 2014-07-08
First Publication Date 2015-01-08
Grant Date 2021-10-26
Owner CUPP Computing AS (Norway)
Inventor
  • Touboul, Shlomo
  • Kaplan, Mark

Abstract

A digital content marketplace filter engine may be configured to identify a communication between a digital content marketplace client and a digital content marketplace server. An analysis engine may be configured to review the communication against a digital content marketplace policy. A response engine configured to block, allow or modify the communication to conform to the digital content marketplace policy.

IPC Classes  ?

  • G06Q 30/06 - Buying, selling or leasing transactions
  • H04W 12/08 - Access security
  • H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity

57.

Systems and methods for providing security services during power management mode

      
Application Number 14155260
Grant Number 09106683
Status In Force
Filing Date 2014-01-14
First Publication Date 2014-05-08
Grant Date 2015-08-11
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting with a mobile security system a wake event on a mobile device, providing from the mobile security system a wake signal, the providing being in response to the wake event to wake a mobile device from a power management mode, and managing with the mobile security system security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

58.

TRANSACTION SECURITY SYSTEMS AND METHODS

      
Application Number US2013064161
Publication Number 2014/059037
Status In Force
Filing Date 2013-10-09
Publication Date 2014-04-17
Owner CUPP COMPUTING AS (Norway)
Inventor Touboul, Shlomo

Abstract

Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

59.

Transaction security systems and methods

      
Application Number 14050279
Grant Number 09973501
Status In Force
Filing Date 2013-10-09
First Publication Date 2014-04-10
Grant Date 2018-05-15
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Outbound traffic of a host application may be received from a host device having a host processor. The secure resource may be configured to provide a secure transaction based on the outbound network traffic. Using a second processor different than the host processor, it may be determined whether the host application is authorized to provide the outbound network traffic to the secure resource. The outbound network traffic may be allowed to be forwarded to the secure resource if the host application is authorized. The outbound network traffic may be disallowed to be forwarded to the secure resource if the host application is not authorized.

IPC Classes  ?

  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

60.

System and method for providing network security to mobile devices

      
Application Number 14092756
Grant Number 09497622
Status In Force
Filing Date 2013-11-27
First Publication Date 2014-03-27
Grant Date 2016-11-15
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

61.

Secure computing system

      
Application Number 13822847
Grant Number 09767297
Status In Force
Filing Date 2011-10-25
First Publication Date 2013-10-03
Grant Date 2017-09-19
Owner CUPP Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

62.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 13745591
Grant Number 09391956
Status In Force
Filing Date 2013-01-18
First Publication Date 2013-08-22
Grant Date 2016-07-12
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • G06F 9/00 - Arrangements for program control, e.g. control units
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

63.

System and method for providing network security to mobile devices

      
Application Number 13735836
Grant Number 08627452
Status In Force
Filing Date 2013-01-07
First Publication Date 2013-08-22
Grant Date 2014-01-07
Owner CUPP Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

64.

SECURE COMPUTER SYSTEM

      
Application Number NO2011000303
Publication Number 2012/057632
Status In Force
Filing Date 2011-10-25
Publication Date 2012-05-03
Owner CUPP COMPUTING AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

A computer system with multiple security levels, the system comprising a high-power processing device (130), a low-power processing device (110), and an interface unit (120) comprising functions for moving classified information between the high-power device (130) and the low-power device (110) according to formal rules for confidentiality and/or integrity. Additional security aspects, e.g. availability, may readily be accommodated. A method for implementing multiple levels of security along a number of independent security axes on the system is also disclosed.

IPC Classes  ?

  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

65.

Systems and methods for providing real time access monitoring of a removable media device

      
Application Number 12622386
Grant Number 08789202
Status In Force
Filing Date 2009-11-19
First Publication Date 2010-08-19
Grant Date 2014-07-22
Owner CUPP Computing AS (Norway)
Inventor
  • Touboul, Shlomo
  • Ferdman, Sela
  • Yusim, Yonathan

Abstract

A mobile security system connects to a mobile device and filters out attacks and malicious code. Using the mobile security system, a mobile device can be protected by greater security and possibly by the same level of security offered by a corporation, enterprise, or other entity associated with the mobile device.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

66.

Systems and methods for providing security services during power management mode

      
Application Number 12535650
Grant Number 08631488
Status In Force
Filing Date 2009-08-04
First Publication Date 2010-02-11
Grant Date 2014-01-14
Owner CUPP Computing AS (Norway)
Inventor
  • Oz, Ami
  • Touboul, Shlomo

Abstract

Systems and methods for providing security services during a power management mode are disclosed. In some embodiments, a method comprises detecting a wake event, providing a wake signal in response to the wake event to wake a mobile device from a power management mode, and managing security services of the mobile device. Managing security services may comprise scanning a hard drive of the mobile devices for viruses and/or other malware. Managing security services may also comprise updating security applications or scanning the mobile device for unauthorized data.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 12/16 - Protection against loss of memory contents
  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions

67.

System and method for implementing content and network security inside a chip

      
Application Number 12402443
Grant Number 08869270
Status In Force
Filing Date 2009-03-11
First Publication Date 2009-10-01
Grant Date 2014-10-21
Owner Cupp Computing AS (Norway)
Inventor Touboul, Shlomo

Abstract

Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/08 - Access security

68.

Dual mode power-saving computing system

      
Application Number 12087609
Grant Number 08065536
Status In Force
Filing Date 2008-01-10
First Publication Date 2009-07-30
Grant Date 2011-11-22
Owner Cupp Computing AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

The present invention relates to a data processing system comprising both a high performance computing sub-system having typical high power consumption and a low performance subsystem requiring less power. The data processing system acts as a single computing device by moving the execution of software from the low performance subsystem to the high performance subsystem when high computing power is needed and vice versa when low computing performance is sufficient, allowing in the latter case to put the high performance subsystem into a power saving state. The invention relates also to related algorithms.

IPC Classes  ?

  • G06F 1/26 - Power supply means, e.g. regulation thereof
  • G06F 1/32 - Means for saving power

69.

System and method for providing network and computer firewall protection with dynamic address isolation to a device

      
Application Number 12130914
Grant Number 08365272
Status In Force
Filing Date 2008-05-30
First Publication Date 2009-05-14
Grant Date 2013-01-29
Owner CUPP COMPUTING AS (Norway)
Inventor Touboul, Shlomo

Abstract

A computer performs dynamic address isolation. The computer comprises an application associated with an application address, a network interface coupled to receive incoming data packets from and transmit outgoing data packets to an external network, a network address translation engine configured to translate between the application address and a public address, and a driver for automatically forwarding the outgoing data packets to the network address translation engine to translate the application address to the public address, and for automatically forwarding the incoming data packets to the network address translation engine to translate the public address to the application address. The computer may communicate with a firewall configured to handle both network-level security and application-level security.

IPC Classes  ?

  • G06F 9/00 - Arrangements for program control, e.g. control units

70.

System and method for providing network security to mobile devices

      
Application Number 11376919
Grant Number 08381297
Status In Force
Filing Date 2006-03-15
First Publication Date 2007-08-23
Grant Date 2013-02-19
Owner CUPP COMPUTING AS (Norway)
Inventor Touboul, Shlomo

Abstract

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

71.

DUAL MODE POWER-SAVING COMPUTING SYSTEM

      
Application Number NO2007000010
Publication Number 2007/081218
Status In Force
Filing Date 2007-01-10
Publication Date 2007-07-19
Owner CUPP COMPUTING AS (Norway)
Inventor Ely, Omar Nathaniel

Abstract

The present invention relates to a data processing system comprising both a high performance computing subsystem having typical high power consumption and a low performance subsystem requiring less power. The data processing system acts as a single computing device by moving the execution of software from the low performance subsystem to the high performance subsystem when high computing power is needed and vice versa when low computing performance is sufficient, allowing in the latter case to put the high performance subsystem into a power saving state. The invention relates also to related algorithms.

IPC Classes  ?

  • G06F 1/32 - Means for saving power
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs