Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

356results about How to "Data Security" patented technology

Authentication watermarks for printed objects and related applications

The disclosure describes systems for creating and authenticating printed objects using authentication and copy detection watermarks. For example, one verification system includes a watermark decoder and a verification module. The watermark decoder detects a copy detection watermark in a printed object to determine whether the printed object has been reproduced. The verification module processes a message decoded from an authentication watermark on the printed object to authenticate the printed object or bearer of the printed object. The authentication and copy detection watermarks may be implemented as the same or different watermarks. For example, the copy detection watermark may be a fragile watermark that carries the message and that degrades in response to a reproduction operation, such as photocopying or scanning and then reprinting the object. Alternatively, the authentication and copy detection watermarks may be separate watermarks embedded in an image that is printed on the object. The authentication watermark, in some applications, includes an identifier that links the object to a database entry with related information about the object. This related information can be used to check the bearer of the object by comparing it with attributes of the bearer (such as a user ID or photo) or the validity of the object by comparing it with attributes that are visible or machine readable on the object.
Owner:INTUIT INC

Authentication watermarks for printed objects and related applications

The disclosure describes systems for creating and authenticating printed objects using authentication and copy detection watermarks. For example, one verification system includes a watermark decoder and a verification module. The watermark decoder detects a copy detection watermark in a printed object to determine whether the printed object has been reproduced. The verification module processes a message decoded from an authentication watermark on the printed object to authenticate the printed object or bearer of the printed object. The authentication and copy detection watermarks may be implemented as the same or different watermarks. For example, the copy detection watermark may be a fragile watermark that carries the message and that degrades in response to a reproduction operation, such as photocopying or scanning and then reprinting the object. Alternatively, the authentication and copy detection watermarks may be separate watermarks embedded in an image that is printed on the object. The authentication watermark, in some applications, includes an identifier that links the object to a database entry with related information about the object. This related information can be used to check the bearer of the object by comparing it with attributes of the bearer (such as a user ID or photo) or the validity of the object by comparing it with attributes that are visible or machine readable on the object.
Owner:INTUIT INC

Methods and systems for managing patient authorizations relating to digital medical data

A network for mediating the peer-to-peer transfer of digital patient medical data includes a plurality of distributed agents each associated with a health care provider and connected to a central system. Periodically the agents collect local information relating to patient medical files and / or data streams, for example diagnostic images and associated reports, and process that information into metadata files acting as pointers to the original files. The metadata files are transmitted to the central system where they are parsed and the attributes are stored on the central system in patient records with records from the same patient grouped together whenever possible. Registered users can search the central system, even in the absence of a unique identifier, to identify patient records pointing to the remote patient medical files. Upon finding a patient medical file, the invention provides a streamlined process for communicating access authorization from the patient to the hospital or facility storing the medical files. Once patient authorization is received, secure processes are provided for transferring the data in its entirety to or for viewing by the user in a peer-to-peer fashion.
Owner:HX TECH

Cloud Storage Data Access Method, Apparatus and System Based on OTP

InactiveUS20120134495A1Small storage space occupancyStrengthens cloud storage data securityMemory loss protectionDigital data processing detailsPlaintextComputer hardware
The present application relates to cloud storage technology and especially relates to a cloud storage data access method, apparatus and system based on OTP. This method includes: generating and storing true random numbers of a predetermined length and a random seed of a predetermined length composed of the true random numbers via a preset method; acquiring data from the random seed for several times and cascading the data acquired each time into a true random data string of no shorter than the length of plaintext; based on the true random data string, generating a true random cryptographic key of no shorter than the length of the plaintext, encrypting the plaintext using this cryptographic key and transmitting ciphertext to a cloud storage data center. This application also provides a cloud storage data access apparatus and system based on OTP. The method, apparatus and system introduced by this invention can generate and store sufficient true random cryptographic key with relatively small physical space occupancy in comparison with that of plaintext, thereby enabling OTP to be applied into cloud storage data security protection.
Owner:BEIJING Z & W TECH CONSULTING

Vehicle remote data acquisition system based on CAN (Controller Area Network) bus

The invention discloses a vehicle remote data acquisition system based on a CAN (Controller Area Network) bus, comprising a remote server and at least one vehicle-mounted remote data acquisition device, wherein each vehicle-mounted remote data acquisition device comprises a processor module, a CAN bus communication module, a voltage comparison module and a radio communication module; input signals of the voltage comparison modules are switching value signals and pulse value signals which are output by vehicle equipment; analog value signals output by the vehicle equipment are processed by an engine ECU (Electronic Control Unit), then transmitted to the CAN bus and received by the CAN bus communication modules; the CAN bus communication module are also used for receiving equipment signals hung on the CAN bus, and the output ends of the CAN bus communication modules are connected with the processor modules through an SPI (Serial Peripheral Interface) bus; and the radio communication modules are used for carrying out radio communication with the server. The system can acquire various information of the vehicle equipment on a plurality of vehicles, data is transmitted to the server for storing through radio communication, and reliable references are provided for the maintenance and the management of the vehicles according to acquired data.
Owner:HIGER

Storage system

A storage system is disclosed that stores data across plural storage devices. The storage system includes plural modules. Each of the modules includes a storage device including a data storage section that has plural slice areas to store data elements one in each, and a control-information storage section that stores control information of the plural slice areas, a communications-function section having a function of sending and receiving the data elements stored in the slice areas in the data storage section. The modules communicate with each other to replicate the data element stored in the slice area into an unused slice area in another module so as to have data redundancy.
Owner:FUJITSU LTD

Online monitoring system of water quality

The invention discloses an online monitoring system of water quality. The online monitoring system comprises an external network remote access module, a main monitoring center module and a water transporting station house module. The main monitoring center module is connected with the external network remote access module and the water transporting station house module. The external network remote access module carries out identity authentication on users for accessing through internet, and achieves grading access control for monitoring data and statistical reports. The main monitoring center module is used for data acquisition, communication transmission, data management, information issuing, novel monitoring and public configuration. The water transporting station house module is used for data acquisition, online analysis and acquisition configuration. According to the invention, access speed, data safety and convenient management and maintenance can be improved.
Owner:SHANGHAI XINZHENG INTELLIGENT TECH CO LTD

Big dipper and 4G-based unmanned aerial vehicle

The invention discloses a big dipper and 4G-based unmanned aerial vehicle which comprises an unmanned aerial vehicle body, wherein a main controller, a big dipper system global positioning device, a data encrypting device, a data processing device, an aerial photo camera, an automatic driving device and a first wireless communication device are arranged on the unmanned aerial vehicle body, and the main controller is respectively connected with the big dipper system global positioning device, the data encrypting device, the data processing device, the aerial photo camera, the automatic driving device and the first wireless communication device. The big dipper and 4G-based unmanned aerial vehicle further comprises a ground base station, wherein the ground base station is provided with a second wireless communication device and a data decryption and analysis device, the data decryption and analysis device is connected with the second wireless communication device, and the first wireless communication device is wirelessly connected with the second wireless communication device through a 4G network. The big dipper and 4G-based unmanned aerial vehicle disclosed by the invention has the characteristics of safety data, immediate monitoring, wide use range and the like.
Owner:WUZHOU UNIV

Monitoring system applicable to different types of wind photovoltaic storage microgrid systems

The invention relates to a distributed generation microgrid system, in particular to a monitoring system applicable to different types of wind photovoltaic storage microgrid systems. The monitoring system comprises a communication conversion module, a communication bus, total communication conversion modules, a monitoring work station, a database server and a remote Web server, wherein the controller of each subsystem of the wind photovoltaic storage microgrid system is connected with different communication conversion modules in a one-to-one correspondence mode; the communication conversion modules are connected with the total communication conversion module through the communication bus; and the total communication conversion module is connected with the monitoring work station, the database server and the remote Web server. The monitoring system has the effects of controlling, monitoring and detecting a wind generating set, a diesel engine unit, a photovoltaic generating set, an energy storage device, a power distribution measuring and control device, a protective device and the like of the whole wind photovoltaic storage microgrid system, so that the microgrid system can stably operate under a grid mode and an island mode. The monitoring system can control each subsystem of the microgrid and detect the operation parameters of the microgrid.
Owner:东方电气集团国际合作有限公司

Computer power backup system and device

A computer power backup system and device are provided. When power to a computer system is lost, a battery backup unit provides power to the computer system for a while, allowing a power management control to send out an alert to an enterprise client so as to urge immediate action. If the power outage persists without being solved, and the power management control detects insufficient power in a battery of the battery backup unit, the power management control will store data in a storage device automatically and safely and then shut down the computer system. When power is restored, the power management control turns on the computer system automatically and begins charging the battery of the battery backup unit. Through the above operation, the integrity and safety of data in the computer system are secured.
Owner:AIC INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products