Neelabh Rai had joined hands with those patented technology providers that is having capability to reduce or eliminate the cyber criminality in cyberspace as his Patented Technology Partners with a sole intention to promote these very niche technologies in Indian cyberspace to have a secure cyberspace.
Our current patented technology partner is Validy Net Inc. – A software publishing company, working in the field of security and control for IT technologies. Validy Net Inc. is a Company that provides Security Through Transparency.
Patent Portfolio of Validy Net Inc.:
Validy entrusted the protection of its inventions to the French Industrial property counsel Beau de Loménie. Validy’s patent portfolio counts 10 worldwide patents and represents more than 100 individual patents and patent applications.
For the following patents, the invention consists, amongst other innovations:
In having some of the variables of a protected application reside in a hardware component during execution.
- “Temporal dissociation”
In modifying variables displaced in a hardware component independently of their transfer.
- “Elementary functions”
In breaking-up functions modifying variables displaced in a hardware component.
In renaming the commands exchanged between the computer and the hardware component to make them unintelligible.
- “Detection and coercion”
In verifying that the part of the protected application executed in the hardware component, is executed according to what was planned during the protection.
- “Conditional branch”
In masking the protected application structure by using the hardware component to provide branch target addresses.
For the following patents, the invention consists,
- “Protection of exchange data”
In protecting the exchange data of an application with the help of a hardware component, keeping the format and the nature of those data unchanged.
- “Library protection”
In protecting the static data of an application (for instance its libraries) with the help of a hardware component, keeping the format and the nature of those data unchanged.
- “Four groups”
In generating on the fly, with the help of a hardware component, never stored and impossible to make-up unique identifiers. It is also possible to verify on the fly if an identifier is valid, without the need to store the generated set of identifiers.
In restricting the access to resources belonging to interactive services being part of at least one cluster of services.