Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

184results about How to "Cost effectiveness" patented technology

Method and apparatus for wide area surveillance of a terrorist or personal threat

The present invention is related to a means for detecting external threats by the use of methods and apparatuses for the wide area detection of chemical, radiological or biological threats using modified personal wireless devices combined with new advanced micro and nanosensor technologies. A cost effective method is provided for wide area surveillance of a potential terrorist or personal threat. Personal electronic devices such as mobile phones, PDAs or watches, in combination with new microsensor technologies described herein, can be used as a new type of platform detection technology for wide area surveillance of major threats. A “Homeland Securitychip is further provided which combines the elements of geo-location, remote wireless communication and sensing into a single chip. The personal electronic devices can be further equipped for detecting various medically related threats. Similarly modified personal devices can be used to detect external threats that are person-specific.
Owner:GENTAG

Systems and Methods for Delivering Content to Vehicles

A content delivery system includes a remote data center in wireless communication with a vehicle telematics system. The remote data center includes a content server, an automated voice recognition system, and a database. The remote data center utilizes combinations of GPS information, voice automation technology, and preconfigured vehicle operator preferences to deliver content to vehicles over a wireless link. The content delivery system includes a web portal at which vehicle operators configure personal profiles, including information regarding personal preferences and / or information pertaining to application access. The web portal feeds the profile information to the remote data center over a remote Internet connection. The remote data center stores the preconfigured vehicle operator profiles in the database, which is later accessed in response to vehicle operator commands recognized by the voice recognition system.
Owner:SIRIUS XM CONNECTED VEHICLE SERVICES

Protective cover assembly

A protective cover assembly used to cover and protect windows, doors or other wall openings for homes, office buildings, hotels, and other walled structures from the destructive forces of a high windstorm, such as a hurricane. The current form of the preferred embodiment consists of a high strength fabric covering an opening, such as a window and being supported by brackets, a rod and a bar. Once installed, the high strength fabric is stretched over the opening, through the use of a gears and ratchet assembly. The high strength fabric once stretched will provide protection from high winds and wind borne debris common in storms such as hurricanes. The protective cover assembly also prevents unlawful entries or break-ins of buildings. The high strength fabric is securely supported to the rod and steel bar that are firmly attached to the wall structure near the wall opening.
Owner:GUNN CAMERON T

Wireless transceiver test bed system and method

A system and method for testing wireless transceivers in a virtual wireless environment including emulating an RF environment, creating virtual spectrum users having selectable transmission parameters and physical characteristics and evaluating the operation of the wireless transceiver in the virtual wireless environment.
Owner:PARSONS CORPROATION

User authentication

There is disclosed some techniques for selecting a user authentication challenge. In one example, the method comprises the steps of receiving an authentication request to authenticate a user and selecting a user authentication challenge to issue to the user in response to receiving the authentication request. The selection of the user authentication challenge comprises selecting a user authentication challenge among a plurality of user authentication challenges based on the cost effectiveness of the respective user authentication challenges and characteristics of the authentication request.
Owner:EMC IP HLDG CO LLC

Vehicle managing method, vehicle managing apparatus and vehicle managing program

A method is disclosed for performing comprehensive management for vehicles owned by clients, including an appropriate number of vehicles to be operated and appropriate operation methods, instead of simple maintenance and management of the vehicles, and according to this method, a vehicle managing apparatus, a client terminal, a workshop terminal and a store terminal are connected via a communication network, and the vehicle managing apparatus includes information acceptance means, maintenance period calculation means, business efficiency analyzation means and information providing means. First, the information acceptance means receives maintenance history information for a vehicle, automotive accessories purchase history information, vehicle operating record information and business performance information for a client, all of which are entered by the workshop terminal or the store terminal. Sequentially, the maintenance period calculation means calculates a maintenance period for the vehicle based on the maintenance history information, the purchase history information and the operating record information, and the business efficiency analyzation means analyzes business efficiency based on the maintenance history information, the purchase history information, the operating record information and the business performance information. Then, the information providing means transmits, to the client terminal, the maintenance period calculation results and the business efficiency analysis results.
Owner:PURE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products