Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

3184results about How to "Improve security level" patented technology

Non-intrusive data transmission network for use in an enterprise facility and method for implementing

The present invention is directed to a non-intrusive data transmission network for use in a healthcare facility and method for implementing such network. Each individual patient's room is equipped with a set-top control device, a separate camera, microphone, control module camera control device. The SCD allows for a non-intrusive installation within a minimum amount of time. By utilizing the existing cable television infrastructure, the device creates a high-speed data network throughout the facility. The interface between the SCD and the CCD is accomplished through a standard interface for universally connecting auxiliary devices, such as USB, for enabling expandable, hot-pluggable Plug and Play serial device interfaces. These ports allow external devices such as the camera, microphone, infrared keyboard and privacy control unit to communicate with the SCD. Additional USB ports on the SCD allow for other devices to be connected to the network at a future time. Such devices include those for instrument monitoring, doctor information access or pharmaceutical prescription ordering. Visual information such as e-mail, web browsing, video and audio communications via web camera applications from family members, friends or other parties may be viewed by the patient from the in-room TV set by way of the internal RF modulator (and connecting to the Internet via the patient Internet server). The SCD switches from the standard cable TV channels to the SCD by way of an internal switch controlled by the patient from an infrared control. This control also enables or disables the camera to allow for privacy at times when such privacy is required from external Internet access. The system is configurable to offer this privacy to be layered from specific Internet or external users to the nurses, doctors or security department as the hospital desires.
Owner:CAREVIEW COMM INC

Financial transaction system and method using electronic messaging

A method and a system for performing financial transactions between parties having clients (15a, 15b) with an electronic messaging facility and a banking account facility with a financial institution. Each party has an electronic messaging address (CIN) associated with the electronic messaging facility and a banking account number (CAN) associated with the banking account facility (27) thereof.
A financial service provider server (13) is interfaced with the electronic messaging facility to handle communications between the clients (15a, 15b) of the parties and is also interfaced with the banking account facilities (27) of the parties to perform the financial transaction. The electronic messaging address (CIN) of each party is linked with the banking account facility therefor, and thus the banking account number(s) (CAN) thereof, within a database (45) associated with the server (13) to facilitate the financial transaction.
The server (13) undertakes an authentication process within one and/or the other party using the electronic messaging facility requiring confirmation of a PIN also stored in the database (45). The authentication process is characterised by the server (13) providing the client (15a) of the one party instigating the financial transaction with a different electronic messaging address to “reply to” when requesting the PIN, from the original electronic messaging address of the server (13) used by that same party to initiate the financial transaction, to enhance the security of the transaction.

Secure yet flexible system architecture for secure devices with flash mass storage memory

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and therefore potentially vulnerable to hacking. An indication of the authenticity of the firmware must be present before it will be executed by the device. This protects the device contents from unauthorized duplication or tampering. Additional functionality can be added to the device with additional firmware applications, and the authenticity of those additional applications will also be verified before they will be executed. This further prevents unauthorized copying or tampering of secure content through any mechanisms that may be unscrupulously introduced. Any data within the mass storage memory may also be encrypted.
Owner:SANDISK TECH LLC +1

Security module system, apparatus and process

A system, method and apparatus for protecting circuit components from unauthorized access. The circuit components to be protected are disposed on a first layer of a substrate with a plurality of layers. A cover member composed of a plurality of layers is abutted to the substrate, defining an enclosure space for enclosing the circuit components to be protected. A three-dimensional resistive network sensor surrounds the protected circuit components. The sensor comprises at least one conduction path in at least one of the layers below the first layer of the substrate and at least one conduction path in at least one of the layers of the cover member and also comprises a plurality of vias transverse to and electrically connecting the conduction paths. A short or open in the sensor will be detected by a tamper detection circuit that is disposed on the first layer of a substrate.
Owner:SAFENET

Electronic bankbook and processing system for financial transaction information using electronic bankbook

PCT No. PCT / JP95 / 01427 Sec. 371 Date Mar. 18, 1996 Sec. 102(e) Date Mar. 18, 1996 PCT Filed Jul. 18, 1995 PCT Pub. No. WO96 / 02890 PCT Pub. Date Feb. 1, 1996The object of the present invention is to propose an account bankbook, a money transfer card, a receipt file, and a checkbook utilizing an optical card, an IC card, or a hybrid optical / IC card. On the surface of a resin card base board 1 are formed an IC chip 11, an optical recording sheet 13, a magnetic stripe 14, and an embossment 12. In a semiconductor memory within the IC chip 11 are written validation keys, search keys, payee information, the upper limit amount of a check, and a program for processing transaction data. Access restrictions corresponding to various applications are imposed upon these data. The history of various cash transactions is recorded in the optical recording sheet 13. These records are of write-once type and rewriting or deletion thereof is impossible.
Owner:N T T DATA TSUSHIN KK

Method and system for determining a probability of entry of a counterfeit domain in a browser

Embodiments of the present invention provide a method and system for determining a probability that a suspected domain name of a domain accessed using a universal resource locator (URL), which can be entered as a character string into a browser associated with a client in a net environment, is a counterfeit of a legitimate domain name. Characters in the suspected domain name can be identified as known as likely to be deceptively substituted for corresponding legitimate characters of a legitimate domain name. An alternate domain name is generated by substituting predetermined characters with the corresponding legitimate characters. An attempt can be made to resolve alternate domains of the alternate domain names. If the names are successfully resolved, a non-zero probability is assigned to the suspected domain name as being counterfeit.
Owner:RED HAT

Aerosolization device

An aerosol transfer device (10) for medical aerosol generators comprises a body (12), fluidically coupled to a nebulizer (14) and to a patient interface (16). An ambient air intake (20) is formed into a lower body (12C). The body is shaped and configured to optimize mixing of ambient air from the ambient air intake and the aerosol generated by the nebulizer, resulting in the formation of an aerosol plume having optimum characteristics for delivery of the aerosol to the patient's pulmonary system, such as the central or deep lung regions. The shape and dimensions of the body are further designed to minimize aerosol deposition, thus improving delivery efficiency.
Owner:NEKTAR THERAPEUTICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products