Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

147results about How to "Improve data integrity" patented technology

Corrected data storage and handling methods

ActiveUS20060039196A1Reduces store dataData disturbanceRead-only memoriesDigital storageReal-time computingTime limit
In order to maintain the integrity of data stored in a flash memory that are susceptible to being disturbed by operations in adjacent regions of the memory, disturb events cause the data to be read, corrected and re-written before becoming so corrupted that valid data cannot be recovered. The sometimes conflicting needs to maintain data integrity and system performance are balanced by deferring execution of some of the corrective action when the memory system has other high priority operations to perform. In a memory system utilizing very large units of erase, the corrective process is executed in a manner that is consistent with efficiently rewriting an amount of data much less than the capacity of a unit of erase. Data is rewritten when severe errors are found during read operations. Portions of data are corrected and copied within the time limit for read operation. Corrected portions are written to dedicated blocks.
Owner:SANDISK TECH LLC

Data center migration method and system using data mirroring

A method and system for migrating computer applications and volumes of data from a source DASD connected to a source computer system to a target DASD connected to a target computer system. The method comprises ensuring data integrity on the source DASD, initiating one or more processes to mirror all data and all data updates from the source DASD to the target DASD, ensuring synchronization of data updates to the source DASD by the source computer system with data updates to the target DASD, deactivating all applications executing on the source computer system, mirroring one or more remaining data updates to the source DASD by the source computer system to the target DASD, disconnecting the source computer system and the source DASD from the target computer system and the target DASD; and bringing the target computer system and the applications executing on the target computer system on-line.
Owner:VERIZON PATENT & LICENSING INC

Authentication system based on biological characteristics and identification authentication method thereof

The invention relates to an authentication system and an authentication method based on biological features. The method comprises the steps of conducting centralized storage and biological feature comparison operation for a large quantity of user biological feature templates according to user ID identifiers stored on a memory on a limited use machine and corresponding biding ID identifiers thereof on a biological authentication device of a digital processing terminal; separating the biological feature templates from the authentication function of the limited use machine; allocating to digital processing terminals (including PCs, notebooks or mobile phones, PDAs of users)of users as biological authentication device-storing the biological feature templates with decentralization and operating and processing biological features to be authenticated with decentralization so as to conduct comparison with the biological feature templates pre-stored on the respective digital processing terminals; feeding back comparison and verification results to the limited use machines; authorizing to conduct equal authentication of the biological authentication device ID identifier on the digital processing terminal for the corresponding binding user ID identifiers by the centralized authentication of the limited use machine according to the comparison verification result data.
Owner:刘洪利

Broadcast encryption transmission method in network based on identification and centering on contents

The invention discloses the technical field of network data transmission safety centering on contents and discloses a broadcast encryption transmission method in a network based on identification and centering on the contents. A content provider requests user identification through a broadcast interest package, a user can send identification information ID representing a public key to the content provider, the content provider uses a broadcast encryption algorithm based on the identification to encrypt plaintexts and then broadcasts the user, only a target user in user collection can decode the obtained plaintext contents, and the user collection can be composed of any user. When the user collection only has one user, a protocol is an end-to-end encryption transmission protocol. When the user collection has multiple users, the protocol is a broadcast encryption transmission protocol, and times of broadcast content encryption transmission are reduced. The method can enable the user identification to be added into the user collection to achieve content access controlling, and achieves data source authentication, data integrality and confidentiality protection based on an autograph of the identification and a broadcast encryption scheme.
Owner:BEIJING JIAOTONG UNIV

Method for generating properly formed expressions

A method for generating properly formed expressions used as validation expressions and search filters for computer system database applications. One or more embodiments of the invention for example comprise an interface that assists users through the use of automatic tokenizing and / or pick lists of field names and fields values, including a measurement builder for entering legal tokenized measurement values with applicable units of measure. Embodiments of the invention allow knowledgeable users to rapidly create expressions to ensure that the legal syntax and semantics of an expression are not violated while providing the user with pick lists and measurement values within legal ranges and with applicable units of measure. Validations rules are generated and performed on desired records in a computer system database without requiring programs, scripts or queries to be written. A validation expression returns a Boolean result that signifies a success or failure result and may be performed manually or automatically.
Owner:SAP AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products