Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

277results about How to "Minimizes probability" patented technology

Digital Content Protection Method and Apparatus

<heading lvl="0">Abstract of Disclosure</heading> Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resistant device communicates with another of the computational units acting as an interface control processor, and serves to protect the contents of a nonvolatile memory from unauthorized access or modification by other portions of the tamper-resistant device, while performing cryptographic computations using the memory contents. Content providers enforce viewing privileges by transmitting encrypted rights keys to a large number of recipient devices. These recipient devices process received messages using the protected processing environment and memory space of the secure unit. The processing result depends on whether the recipient device was specified by the content provider as authorized to view some encrypted digital content. Authorized recipient devices can use the processing result in decrypting the content, while unauthorized devices cannot decrypt the content. A related aspect of the invention provides for securing computational units and controlling attacks. For example, updates to the nonvolatile memory, including program updates, are supported and protected via a cryptographic unlocking and validation process in the secure unit, which can include digital signature verification.
Owner:CRYPTOGRAPHY RESEARCH

Resource allocation scheduling method for a cellular communication system

A resource allocation scheduling method for a cellular communication system that can avoid interference between cells. The method includes dividing a frequency band of a system into frames each having preferential allocation blocks and general allocation blocks on a time axis, classifying terminals in each cell into groups of terminals vulnerable to interference and terminals non-vulnerable to interference, and allocating resources by terminal groups according to priority orders given to the terminal groups. The preferential allocation resources designed to have the orthogonality to the interference cells, i.e., sectors, on the time axis are allocated to the terminals vulnerable to the interference, and the remaining resources are allocated to the terminals non-vulnerable to the interference.
Owner:SAMSUNG ELECTRONICS CO LTD +1

Front-loading adjustable safety utility knife with safety quick-release lock

An adjustable safety utility knife includes an elongated ergonomically shaped handle formed of two elongate shell members each having a peripheral edge and an outer generally convex surface and an inner generally concave surface. The shell members are fastened at the peripheral edges along a vertical parting plane to form an elongated internal cavity. The handle defines a front end, a back end and an intermediate portion suitable for being gripped by a user and also defining top and bottom surfaces extending along opposite sides of the shell members along the peripheral edges. The handle has a slot-like aperture at the front end substantially aligned with the parting plane and dimensioned for passage of a flat cutting blade therethrough. A guide element within the elongated cavity guides the cutting blade between a first position for safely storing the blade fully inside the cavity and a second position for selectively extending the blade beyond the aperture to expose at least a portion thereof. A manually operated button is arranged on the top surface and coupled to the guide element for selectively moving the blade between the first and second positions. The guide element includes a carriage within the elongated internal cavity for supporting a flat cutting blade and guide elements on at least one of the inner generally concave surfaces for guiding the carriage and cutting blade carried thereby between the first and second positions. The carriage includes a locking element for normally locking a cutting blade mounted thereon to substantially fix the cutting blade against relative longitudinal movements between the cutting blade and carriage. The locking element includes an unlocking element the actuation of which releases the cutting blade to permit relative longitudinal movements between the cutting blade and the carriage. A blade release element on one of the shell members actuates the unlocking element when manual force is applied thereto, whereby application of a force on the release element releases the cutting blade and enables it to be withdrawn through the front end aperture.
Owner:OLYMPIA IND +1

Method and system for providing a fault tolerant display unit in an electronic device

Method and apparatus for providing a fault tolerant display unit for an electronic device such as a glucose meter, including display unit, and a controller unit operatively coupled to the display unit, the controller unit configured to control the display unit to display an information, where when a failure mode of the display unit occurs, the display unit is configured to display a modified information, where the modified information is different from the information for display under the control of the controller unit, is provided.
Owner:ABBOTT DIABETES CARE INC

Intrusion detection system for use on single mode optical fiber using a simplified polarimeter

A telecommunications optical fiber is secured against intrusion by detecting manipulation of the optical fiber prior to an intrusion event. This can be used in a non-locating system where the detection end is opposite the transmit end or in a locating system which uses Fresnel reflections and Rayleigh backscattering to the transmit end to detect and then locate the motion. The Rayleigh backscattering time sliced data can be stored in a register until an intrusion event is detected. The detection is carried out by a polarization detection system which includes an optical splitter which is manufactured in simplified form for economic construction. This uses a non-calibrated splitter and less than all four of the Stokes parameters. It can use a polarimeter type function limited to linear and circular polarization or two linear polarizers at 90 degrees.
Owner:NETWORK INTEGRITY SYST

Method and system for extending lifetime of sensor nodes in wireless sensor network

InactiveUS20090216349A1Extended service lifeMinimizes operation probabilityProgramme controlEnergy efficient ICTLine sensorSleep time
A method and system are provided that extend the lifetime of sensor nodes in a wireless sensor network while ensuring network availability. An availability level is set for ensuring network connectivity corresponding to importance of network connectedness. An operation probability that a sensor node is in operation is calculated. A total sleeping time of the sensor node is calculated that minimizes the operation probability while maintaining the availability level.
Owner:SAMSUNG ELECTRONICS CO LTD +1

Seat belt restraint system with double shoulder belts

A seat-belt-restraint-system (40) for a vehicle occupant (30) seated in a vehicle seat (32). Seat-belt-restraint-system (40) includes two shoulder belts (42) and (46), a middle portion belt (52), a seat belt buckle (60), a seat belt latch (58), a connect mechanism (50), and a lap belt (54). The upper end of shoulder belt (42) is extendable and retractable to the upper portion of the vehicle adjacent the occupant's shoulder. The upper end of shoulder belt (46) is extendable and retractable to the upper portion of seatback (34) adjacent the occupant's shoulder. The lower ends of both shoulder belts (42) and (46) lead to connect mechanism (50). The first end of middle portion belt (52) leads to connect mechanism (50). The second end of middle portion belt (52) is connected to the first end of lap belt (54). The second end of lap belt (54) is anchored to the vehicle and disposed on the outboard side of occupant (30). Connect mechanism (50) interconnects the lower ends of both shoulder belts (42) and (46) and the first end of middle portion belt (52). Seat belt latch (58) has a webbing loop, through which middle portion belt (52) is threaded, such that seat belt latch (58) is slidable along middle potion belt (58). Seat belt buckle (60) is anchored to the vehicle and disposed on the inboard side of the occupant (30) for lockably receiving seat belt latch (58).
Owner:XU ZHAOXIA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products