Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

285results about How to "Efficient addition" patented technology

Group key distribution

A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be the intended party. The method preferably uses a public key / private key encryption technique in which, for example, a trusted Certificate Authority in a public key infrastructure signs the certificates to provide the public keys involved in the encryption. Alternatively, the method, together with a symmetric cipher, uses a shared secret, established in an authenticated mechanism that is outside the information exchanges of the invention. Additionally, the method uses a strong mixing function that takes several items of data as input and produces a pseudo-random authentication (or digest). Inputs to the mixing function include identity stamps that are generated by each member M and key holder H. These inputs can be the identity of the stamp generator, such as a network address, port, or protocol, a timestamp, and / or a secret value that is known only to the stamp generator. The stamps include information to bind member M if generated by key holder H, and to bind key holder H if generated by member M. Consequently, the invention authenticates each communication exchange between member M and key holder H.
Owner:CISCO TECH INC

Group key distribution

A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be the intended party. The method preferably uses a public key / private key encryption technique in which, for example, a trusted Certificate Authority in a public key infrastructure signs the certificates to provide the public keys involved in the encryption. Alternatively, the method, together with a symmetric cipher, uses a shared secret, established in an authenticated mechanism that is outside the information exchanges of the invention. Additionally, the method uses a strong mixing function that takes several items of data as input and produces a pseudorandom authentication (or digest). Inputs to the mixing function include identity stamps that are generated by each member M and key holder H. These inputs can be the identity of the stamp generator, such as a network address, port, or protocol, a timestamp, and / or a secret value that is known only to the stamp generator. The stamps include information to bind member M if generated by key holder H, and to bind key holder H if generated by member M. Consequently, the invention authenticates each communication exchange between member M and key holder H.
Owner:CISCO TECH INC

Common interconnection network content keyword interactive system

Mutual universal network content keyword mutual system with true matching keyword and simply and rapidly adding keyword at real time. It relates to web page information grasp-organ, web page information analyzer to analyze the grasped page text, keyword index module to count matrix of web page and keyword. It also owns keyword demand module to find out keyword array which corresponds to the ID of web pages of keyword filtrating needed in the said web page, keyword matrix and JavaScript code interface. Then calculate the intersection about advertisement keyword bank to get a series of keywords and to classify and screen out the front keywords according to web page and advertisement keyword and advertisement keyword bank. Its AD Center module incepts HTTP demand sent by JavaScript code, calculates web pages ID corresponding URL, sends ID demand to keyword demand module, incepts the feedback keyword and the corresponding mutual advertisement information and adds them to the web page user ending by alternating with JavaScript code interface.
Owner:陈远

Method and system for defining media objects for computer network monitoring

Method and system for defining media objects, such as images and graphics, to represent computer networked resources and assets, along with their associated events, while monitoring the same in a real-time environment is disclosed.
Owner:ARB INTPROP HLDG HK

Agricultural fibre fuel pellets

A method of preparing fuel pellets includes the steps of providing a feedstock in the form of agricultural hull fibres having a moisture content of about 10 to about 16%; and compressing and extruding the agricultural fibre feedstock through a die to obtain fuel pellets in the form of small cylinders having a diameter of about ⅜ inch to ¾ inch or more, said pellets having an ash content of about 1.1% to about 20% by weight and a calorific value of about 7,000 BTUs per pound of fuel on a dry basis. The agricultural hull fibres may be derived from all whole grains and seeds. For example, are comprised of at least one of corn bran fibre, rye bran fibre; oat bran fibre, rice bran fibre, soy bran fibre, canola bran fibre and wheat bran fibre. The method may include the step of pre-treating the agricultural whole grain and seed hull fibre feedstock with high temperature steam before being formed into pellets at a sufficient temperature and sufficient time to activate hemicellulose within the fibre as a binding agent. The method may include the step of mixing the agricultural whole grain and seed hull fibre feedstock with a sequestering agent before being formed into pellets for sequestering alkali metal vapors and raising the fusion point of the inorganic elements during combustion of the pellets. The sequestering agent may be calcium carbonate added in amounts up to about 0.5% by weight. The pellets contain additives comprised of ammonium nitrate, calcium, manganese, magnesium, aluminum, barium, iron, potassium and amorphous silicate, which sequester potassium and chlorides and alter the fusion point of the inorganic elements present in the fuel.
Owner:EVERGREEN BIOFUELS

Syringe assembly having disabling mechanism

A syringe assembly having passive disabling structure includes a barrel and a plunger rod assembly. The plunger rod assembly includes a plunger rod and a stopper connected by an indexing locking element. The number of strokes of the syringe plunger before the stopper is locked into the barrel rendering the syringe assembly unusable is determined by the number of detents on the plunger rod and stopper which engage the locking mechanism. Upon completion of the final delivery stroke, any attempt to withdraw the plunger rod from the barrel will cause the locking element to engage the barrel and trap the stopper in the barrel preventing further use of the syringe.
Owner:BECTON DICKINSON & CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products