Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

145results about How to "Little information" patented technology

Storing and retrieving computer data files using an encrypted network drive file system

A system and method for storing computer files in a destination file is described, which may be an incremental backup system. File headers related to the files may be stored in a file index separate from a data file, or subsequent versions may be stored in the same data file while maintaining earlier versions. File headers may include locations of files, checksums, metadata about individual blocks corresponding to the data files. A system may include a client application program stored on a client computer, a network, and a server software program on a destination computer. Embodiments may include compression, encryption, or both, performed by the client application program. Files may be divided into blocks, and metadata may include locations of blocks. Files may be restored from the destination computer to the source computer. Files storage locations on the destination computer may be mapped to the client computer to appear as a virtual hard drive for convenient access by a user.
Owner:IDRIVE INC

Methods, apparatuses and computer program products for providing a constant level of information in augmented reality

An apparatus for providing a constant level of information in an augmented reality environment may include a processor and memory storing executable computer program code that cause the apparatus to at least perform operations including determining a first number of points of interest associated with a first set of real world objects of a current location(s). The first set of real world objects is currently displayed. The computer program code may further cause the apparatus to determine whether the first number is below a predetermined threshold and may increase a view range of a device to display a second set of real world objects. The view range may be increased in order to increase the first number to a second number of points of interest that corresponds to the threshold, based on determining that the first number is below the threshold. Corresponding methods and computer program products are also provided.
Owner:NOKIA TECHNOLOGLES OY

Scheme for Generating a Parametric Representation for Low-Bit Rate Applications

For generating a parametric representation of a multi-channel signal especially suitable for low-bit rate applications, only the location of the maximum of the sound energy within a replay setup is encoded and transmitted using direction parameter information. For multi-channel reconstruction, the energy distribution of the output channels identified by the direction parameter information is controlled by the direction parameter information, while the energy distribution in the remaining ambience channels is not controlled by the direction parameter information.
Owner:DOLBY INT AB

Spatial position sharing system, data sharing system, network game system, and network game client

In a client (16), current position information and predicted future position information for an object that have been generated in another client (16) are received, and estimated current position information for the same object in virtual space are sequentially generated based on these items of information. A game server (12) controls transfer of position information received from non-specified clients to specified clients. Further, at the client (16), in a message input mode, current position information for an object is generated automatically or semi-automatically, and that current position information is transmitted to the game server (12).
Owner:GENKI

Method and apparatus for user identification using pulsating light source

Pulsating light is used to penetrate a user's finger placed an input surface (which can be a fiber optic surface) of a video camera to avoid the effects of bloodflow from a normal human pulse on the quality of the image which would otherwise change the contrast of the image. The use of pulsating light of shorter durations than a typical human pulse provides an accurate image of a portion of a finger for identification. A retractable cover blocks the fiber optic input surface during a non-working mode, and allows access for identification during a working mode. A light source having a plurality of light emitting diodes provides light that diaphans a portion of the finger. Several successive frames of image signals allow for biometric detection and verification of a human pulse to ensure the finger is not a counterfeit.
Owner:MINKIN VIKTOR ALBERTOVICH +4

Systems and techniques for aggregation, display, and sharing of data

Systems and techniques for aggregation, display, and sharing of data. Graphic items representing data objects identified by a data package may be displayed on timelines. Each timeline may be associated with a respective class of data, and each graphic item displayed on a respective timeline may represent one or more of the data objects in the class associated with the respective timeline. A prediction may be made regarding which data will be displayed in the near future. A pre-fetch request may be generated, and the predicted data may be retrieved from a remote server and stored in a local data cache before the user requests that the predicted data be displayed.
Owner:SYNTHRO INC

Electric vehicle intelligent queuing method capable of improving charging efficiency

The invention provides an electric vehicle intelligent queuing method capable of improving charging efficiency. The method is characterized by comprising the following steps that firstly, an electric vehicle driver is in connection with an intelligent charging network and a vehicle-mounted computer of an electric vehicle through an intelligent terminal; secondly, the intelligent terminal receives electric vehicle information transmitted by the vehicle-mounted computer in real time, wherein the electric vehicle information comprises electric vehicle serial numbers, residual electricity quantity, driving mileage and charging early-warning signals; thirdly, after the intelligent terminal receives the charging early-warning signals, the intelligent terminal is in communication with the intelligent charging network server and issues a charging request to the intelligent charging network server, ..., and eleventh, the turned electric vehicle is connected with an intelligent charging pile to be charged. According to the method, through a smart phone, the charging pile can be looked for, and through the residual electricity quantity of the electric vehicle, waiting time and predicated charging time required by charging several closest charging piles can be accurately predicated, the queuing efficiency is improved, and the queuing time is shortened.
Owner:BEIJING FLASH CHARGE NETWORK TECH CO LTD

Device and method with reduced information leakage

The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products