Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

621results about How to "Increase the amount of data" patented technology

Method and apparatus for transmitting and receiving data using visible light communication

InactiveUS20120155889A1Increase amount of dataIncrease in information amountClose-range type systemsElectromagnetic transmittersCode bookImage sensor
A transmitting apparatus using visible light communication generates transmission data into a two-dimensional data code according to a predetermined code method between the transmitting apparatus and a receiving apparatus and transmits the two-dimensional data code through a plurality of light emitting diodes (LED) that are arranged in a two-dimensional form. Therefore, the receiving apparatus senses light from a plurality of LEDs as an image using an image sensor, demodulates the image into a two-dimensional data code, decodes the two-dimensional data code using a code book, and restores data.
Owner:ELECTRONICS & TELECOMM RES INST

Absolute public key cryptographic system and method surviving private-key compromise with other advantages

The present invention presents a public key cryptographic system and method called Absolute Public Key Cryptography that survives private key compromise and offers two-way communication security. Communications are secured even when the private key is revealed. It provides security to the private-to-public side communications and also allows short keys to be used with mobile devices that have low processing power. The system uses keys with two or more components and encrypts a message into the same number of cipher versions. The cipher versions are delivered to the destination in source routing mode, or hop-by-hop routing mode with a small time gap. The recipient performs certain mathematical operations on all the cipher versions and obtains the original message. All the versions are necessary for obtaining the original message. Even a single version missing leads to produce a junk for an attacker. As an attacker at an intermediary IP router can not have all the cipher versions available, he can not obtain the original message even when he knows the private key. This is why the system is called Absolute Public Key Cryptography. The robustness against private key compromise is achieved by blinding the public key through adding a random number to each of its components before encryption. When the encryption process is complete, the random number is discarded and the cipher versions are delivered to the recipient. The effect of blinding is made void by the actual intended recipient, who has all the cipher versions available. Robustness is also achieved another way, that is, by choosing the encrypting key such that each of its components has a common factor with Euler Totient Function of the key modulus, and there is no common factor among all the components. This makes it harder for an attacker to decrypt a single cipher version of the message into the original message and thereby allows smaller keys to be used for mobile communications. Communication in both directions is secured by using two different key pairs, one for public-to-private-side and the other for private-to-public-side communications.
Owner:KIOBA PROCESSING LLC

Reducing the effects of noise in non-volatile memories through multiple reads

Storage elements are read multiple times and the results are accumulated and averaged for each storage element to reduce the effects of noise or other transients in the storage elements and associated circuits that may adversely affect the quality of the read. Several techniques may be employed, including: A full read and transfer of the data from the storage device to the controller device for each iteration, with averaging performed by the controller; a full read of the data for each iteration, with the averaging performed by the storage device, and no transfer to the controller until the final results are obtained; one full read followed by a number of faster re-reads exploiting the already established state information to avoid a full read, followed by an intelligent algorithm to guide the state at which the storage element is sensed. These techniques may be used as the normal mode of operation, or invoked upon exception condition, depending on the system characteristics. A similar form of signal averaging may be employed during the verify phase of programming. An embodiment of this technique would use a peak-detection scheme. In this scenario, several verify checks are performed at the state prior to deciding if the storage element has reached the target state. If some predetermined portion of the verifies fail, the storage element receives additional programming. These techniques allow the system to store more states per storage element in the presence of various sources of noise.
Owner:SANDISK TECH LLC

Real-time expression recognition method based on multichannel parallel convolutional neural network (MPCNN)

The invention discloses a real-time expression recognition method based on a multichannel parallel convolutional neural network (MPCNN). The method comprises the steps of: extracting expression data, which contains RGB and Depth images, from a facial-expression data set; carrying out local binarization preprocessing (LBP) and facial-key-point extraction preprocessing on the color images, carrying out gradient preprocessing on the depth images, dividing the preprocessed images into two parts of a training set and a test set, and building the multichannel parallel convolutional neural network; sending the preprocessed images in the training set to the network for training to obtain depth channel, lbp channel and key-point channel recognition models which learn facial-expression outlines, stereoscopic distribution and key-point features; and adopting maximum confidence to fuse classification results of the three recognition models to obtain a final expression recognition model, and building a real-time expression recognition system. The method enhances the robustness of the recognition network, and effectively improves the performance of the real-time expression recognition system.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Distributed secure data storage and transmission of streaming media content

Disclosed is a method for the distributed storage and distribution of data. Original data is divided into fragments and erasure encoding is performed on it. The divided fragments are dispersedly stored on a plurality of storage mediums, preferably that are geographically remote from one another. When access to the data is requested, the fragments are transmitted through a network and reconstructed into the original data. In certain embodiments, the original data is media content which is steamed to a user from the distributed storage.
Owner:DATOMIA RES LABS OU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products