Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

475results about How to "Maximize the benefits" patented technology

Light weight parallel manipulators using active/passive cables

The present invention provides parallel, cable based robotic manipulators, for use in different applications such as ultra high-speed robots or positioning devices with between three to six degrees of freedom. The manipulators provide more options for the number of degrees of freedom and also more simplicity compared to the current cable-based robots. The general structure of these manipulators includes a base platform, a moving platform or end effector, an extensible or telescoping central post connecting the base to moving platform to apply a pushing force to the platforms. The central post can apply the force by an actuator (active), or spring or air pressure (passive) using telescoping cylinders. The robotic manipulators use a combination of active and passive tensile (cable) members, and collapsible and rigid links to maximize the benefits of both pure cable and conventional parallel mechanisms. Different embodiments of the robotic manipulators use either active cables only, passive cables only, or combinations of active and passive cables. An active cable is one whose length is varied by means of a winch. A passive cable is one whose length is constant and which is used to provide a mechanical constraint. These mechanisms reduce the moving inertia significantly to enhance the operational speed of the robots. They also provide a simpler, more cost effective way to manufacture parallel mechanisms for use in robotic applications.
Owner:KHAJEPOUR AMIR +3

Risk Adaptive Information Flow Based Access Control

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request / response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products