Patents Assigned to KUITY CORP
  • Publication number: 20120150581
    Abstract: Systems and methods for cross-domain calendaring are described. A plurality of invitees is identified in response to an event scheduling request and scheduling information for each invitee is obtained. The scheduling information includes information obtained from at least two different types of calendaring system and comprises information regarding other events associated with each invitee. A priority is set for each invitee based on the scheduling information and the event scheduling request.
    Type: Application
    Filed: October 6, 2011
    Publication date: June 14, 2012
    Applicant: KUITY Corp.
    Inventor: Lon Daniel McPhail
  • Publication number: 20110167496
    Abstract: A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot execute an instruction that is not authorized. A Command Filter Matrix stores entries comprising instructions and associated data memory ranges. A hardware arrangement denies command execution if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in the Command Filter Matrix. The Command Filter Matrix may be implemented in a Field Programmable Gate Array such that the memory cell content is pre-programmed with entrusted code by a separate trusted hardware source. In this way, an operating system may function normally but only execute trusted instructions, commands and memory operations. The Command Filter Matrix also contains external write-only capability to enable external monitoring of performance.
    Type: Application
    Filed: March 10, 2011
    Publication date: July 7, 2011
    Applicant: KUITY CORP.
    Inventors: Lon Daniel McPhail, David S. Gillett
  • Publication number: 20110010773
    Abstract: A semiconductor integrated circuit includes a hardware mechanism arranged to ensure that associations between instructions and data are enforced so that a processor cannot execute an instruction that is not authorized. A Command Filter Matrix stores entries comprising instructions and associated data memory ranges. A hardware arrangement denies command execution if the CPU attempts to make a data fetch from an instruction that is outside the range associated with data in the Command Filter Matrix. The Command Filter Matrix may be implemented in a Field Programmable Gate Array such that the memory cell content is pre-programmed with entrusted code by a separate trusted hardware source. In this way, an operating system may function normally but only execute trusted instructions, commands and memory operations. The Command Filter Matrix also contains external write-only capability to enable external monitoring of performance.
    Type: Application
    Filed: July 7, 2010
    Publication date: January 13, 2011
    Applicant: KUITY CORP.
    Inventors: Lon Daniel MCPHAIL, David S. Gillett
  • Publication number: 20100251376
    Abstract: Enterprise resource planning systems and methods are described. Point sources for at-risk components and technologies in an enterprise are assembled, identified and localized by identifying factors such as geo-political affiliation of parties including employers, employees, organizations, education levels of the parties, capability and abilities to create or modify malware, and the financial level of the per-capita population model-based threat rankings. Threats to a pipeline are determined, ranked, and a targeted risk mitigation prioritization plan against identified high-level threats is created.
    Type: Application
    Filed: March 29, 2010
    Publication date: September 30, 2010
    Applicant: KUITY CORP
    Inventor: Lon Daniel McPhail