Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

168results about How to "Effective security" patented technology

Selective data encryption using style sheet processing

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:IBM CORP

Selective data encryption using style sheet processing for decryption by a client proxy

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:IBM CORP

Selective data encryption using style sheet processing for decryption by a key recovery agent

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and / or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:PHONENICIA INNOVATIONS LLC SUBSIDIARY OF PENDRELL TECH

Selective data encryption using style sheet processing for decryption by a group clerk

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g., an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:IBM CORP

Wireless laser power transmitter

An optical power beam transmission systems, with a directional light transmitter and receiver. The transmitter contains an amplifying laser medium, and this together with a retroreflector in the receiver, forms a laser resonator. When lasing sets in, the receiver can extract optical power through an output coupler and convert it to electrical power. The gain medium may be a disc having a thickness substantially smaller than its lateral dimensions. The laser resonator is operated as a stable resonator to ensure safe operation. This is achieved by use of an adaptive optical element, for reducing the diameter of the energy beam impinging on the gain medium, thereby increasing the overlap between the energy beam and the gain medium. As the transmitter-receiver distance is changed, such as by movement of the receiver, the adaptive optical element focal length changes to ensure that the cavity remains within its stability zone.
Owner:WI CHARGE

Real-time hdr video for vehicle control

The invention provides an autonomous vehicle with a video camera that merges images taken a different light levels by replacing saturated parts of an image with corresponding parts of a lower-light image to stream a video with a dynamic range that extends to include very low-light and very intensely lit parts of a scene. The high dynamic range (HDR) camera streams the HDR video to a HDR system in real time—as the vehicle operates. As pixel values are provided by the camera's image sensors, those values are streamed directly through a pipeline processing operation and on to the HDR system without any requirement to wait and collect entire images, or frames, before using the video information.
Owner:CONTRAST INC

Multidimensional evaluation method for large-scale grounding grid

A multidimensional evaluation method for a large-scale grounding grid includes the following steps of on-site testing, numerical calculation based on the electromagnetic field principle and multidimensional evaluation on the grounding grid. The foothold of the multidimensional evaluation method for the grounding grid is based on basic functions of the grounding grid, the basic functions are stream breaking and potential holding safety performance under power frequency grounding faults and lightning stroke faults, and the evaluation problems of characteristic parameters reflecting the safety performance of the grounding grid under the power frequency grounding faults and in the state of lightning stroke are mainly solved, wherein the characteristic parameters relate to grounding grid potential rising, potential difference in the grid, a step voltage, a contact voltage and the like. The multidimensional evaluation on the grounding grid is achieved from the aspects of the characteristic parameters of the grounding grid, integrity of the grounding grid, corrosion evaluation, thermal stability check and the like, safety of the grounding grid is expressed more scientifically, the evaluation on the state of the grounding grid is more accurate, and the safety problem and the defects of the grounding grid are rectified more effectively in a more pertinent mode.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID +1

3D face live detection method, face authentication and recognition method and device

An embodiment of the specification relates to a three-dimensional face living detection method, a face authentication recognition method and a device thereof. The method comprises the following steps:acquiring a plurality of frames of depth images for a target detection object; performing alignment preprocessing on the multi-frame depth images to obtain the preprocessed point cloud data; normalizing the point cloud data to obtain a gray-scale depth image; a live detection being perform based on that gray-scale depth image and the live detection model.
Owner:ADVANCED NEW TECH CO LTD

Rapid bridge testing and estimation method based on change of time-varying dynamic characteristics of axle coupling system

ActiveCN109357822AAchieving Deformation PredictionEffective assessmentElasticity measurementMobile vehicleEstimation methods
The invention discloses a rapid bridge testing and estimation method based on change of time-varying dynamic characteristics of an axle coupling system. The rapid bridge testing and estimation methodcomprises the steps that vibration response of a structure under a moving vehicle is collected through a sensor arranged on a bridge, time-varying dynamic characteristic parameters of the axle coupling system are identified through a variational modal decomposition method and then substituted into a mapping relation among a vibration mode scaling factor, vehicle parameters and the time-varying dynamic characteristics, thus the vibration mode scaling factor and displacement flexibility matrix deep parameters of the structure can be calculated, accordingly, deformation of the structure at any static load is predicted, and structure damage identification based on a displacement flexibility matrix is conducted. The rapid bridge testing and estimation method has the advantage that the deep parameters of the structure are identified from only-output vibration response, and then structure performance is estimated, has the characteristics of low required test cost, short testing time and highidentification precision, and has wide prospects of being widely applied to safety estimation of multiple bridges on a national highway network.
Owner:SOUTHEAST UNIV

Side slope anchoring structure with early warning energy consumption and damping control system and construction method

The invention discloses a side slope anchoring structure with an early warning energy consumption and damping control system and a construction method, belonging to the field of rock and soil anchorage disaster prevention and reduction. A framework 1 is anchored with an anchor rod 6 and a control anchor tube 16 through an anchorage device 14; a displacement sensor 11 on the framework 1 and an electro-hydraulic servo valve 25 of the control anchor tube 16 are connected with a single-chip microcomputer 9 through a communication line, thereby forming a damping control anchoring structure. The side slope anchoring structure is characterized in that an early warning program is installed in the single-chip microcomputer 9 and is connected with an alarm 13; a shock isolation layer 7 is formed between the framework 1 and an unstable soil body 30; the anchor rod 6 and the control anchor tube 16 are arranged at a certain interval, and pass through the framework 1; a power supply system 8 is connected with the single-chip microcomputer 9 through the communication line 10; the single-chip microcomputer 9 is connected with an amplifier 12, the displacement sensor 11 and the electro-hydraulic servo valve 25 respectively through the communication line 10.
Owner:LANZHOU UNIVERSITY OF TECHNOLOGY

Method and system for secure authentication using mobile electronic devices

An identity authentication system that controls access to devices information and areas only to authorized individuals. The system includes one or more processors that have a communication interface such that the processor can transmit signals to personal communication devices carried by individuals, such as cellular telephones, PDAs, pagers, and the like. The individual, to gain access to a particular secure component, area or information, is then prompted to provide PIN numbers or access codes via their personal communication device.
Owner:SAITO WILLIAM H

Bridge rapid test and evaluation method based on temperature change

ActiveCN107389285AEffective securityEffective maintenance managementElasticity measurementStructural dynamicsEngineering
The invention discloses a bridge rapid test and evaluation method based on temperature change. Structural dynamic response of the bridge structure under different temperature conditions is acquired through sensors arranged on the bridge; and the basic dynamic characteristic parameters of the bridge structure under different temperature conditions are identified by using a dynamic signal analysis method and substituted in the mapping relationship between the vibration mode scaling factor and the external temperature conditions and the dynamic parameters to obtain the vibration mode scaling factor of the bridge structure and the displacement flexibility matrix deep parameters under different temperature conditions so as to predict deformation of the structure under any static load and perform damage identification and long-term structural performance study. The disadvantages that the conventional impact vibration test requires an artificial excitation device and requires to close the traffic can be overcome, and the disadvantages that the present environmental vibration test method cannot effectively support bridge structure safety evaluation can also be overcome so that the method has the advantages of less test time without closing the traffic, high accuracy and high anti-noise capacity.
Owner:SOUTHEAST UNIV

Power grid operator safety helmet wearing management control method and system

The invention provides a power grid operator safety helmet wearing management control method and system. The power grid operator safety helmet wearing management control method includes the steps: obtaining image data of a construction site according to time periods; analyzing the image data of the camera equipment, and acquiring personnel information corresponding to the image in the constructionsite in the current time period according to the face image characteristics; obtaining head characteristics of the person image corresponding to the shooting data of the camera equipment in the current time period; if the head corresponding to the face image has no safety helmet feature image, obtaining personnel information corresponding to the face image, and marking a safety helmet unworn record in the personnel information record; and screening personnel information of which the safety helmet unworn records are greater than or equal to a preset time threshold in a preset first time periodfrom a database. According to the safety helmet wearing management method and system, the track graph is drawn based on the obtained safety helmet wearing conditions of the personnel, and the wearingconditions of the construction personnel are visually reflected, and the construction safety is guaranteed; meanwhile, an active alarm device is provided to facilitate the first-time alarm of constructors.
Owner:ANHUI JIYUAN SOFTWARE CO LTD +1

Power safety system

A power safety system includes a first MOS, a second MOS, a switch and a body controller. The first MOS is connected between a power input and a power output. The second MOSFET is connected between the power output and a charging output. The switch has an end connected to the body of the first MOS, and the opposite end switched between the source and the drain of the first MOS. A body controller controls the switch according to the voltage at the power input and the voltage at the power output, to connect the body of the first MOS to the source or the drain of the first MOS. By switching the switch, the first MOS will have a parasitic diode effective to prevent a reverse current from the power output to the power input.
Owner:RICHTEK TECH

Vehicle and structure information simultaneous identification method based on axle coupling vibration

ActiveCN109858156AEffective securityAvoid the disadvantage of needing to predict vehicle parametersSustainable transportationSpecial data processing applicationsRoad networksSecure state
The invention discloses a vehicle and structure information simultaneous identification method based on axle coupling vibration. The method includes acquiring structural environment vibration responsedata and structural sports car vibration response data through sensors arranged on a bridge; respectively identifying a basic modal parameter and a time-varying modal parameter of the structure through a modal algorithm; substituting into a mapping parameter equation of a structural vibration mode scaling coefficient, a modal parameter and a vehicle parameter; calculating vehicle parameters by utilizing the time-varying modal parameters at different moments; further obtaining a structural vibration mode scaling coefficient; reconstructing deep-level parameters of a structure displacement flexibility matrix through the vibration mode scaling coefficient and furthermore, predicting the displacement of structure under any static load, and evaluating current safety state of structure. According to the method, the vehicle parameters and the structure parameters can be recognized only from the structure vibration response, and the method has the advantages of being convenient to test, shortin consumed time and high in precision and is suitable for safety evaluation of many bridges in a road network.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products