Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

103results about How to "Preventing number" patented technology

Lighting device for solid-state light source and illumination apparatus using same

A lighting device for lighting a solid-state light source includes: a DC power circuit unit for converting a power of an input DC power source using a switching element and flowing a current through a solid-state light source; and a control unit for performing a first switching control in which the switching element is turned on / off at a first high frequency and a second switching control in which an ON / OFF operation of the switching element is intermittently stopped at a second frequency lower than the first frequency of the first switching control. When the current flowing through the solid-state light source is changed, the second frequency is varied.
Owner:PANASONIC CORP

Complementary Character Encoding for Preventing Input Injection in Web Applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Image processing apparatus and personal information management program

An image processing apparatus and a personal information management program are provided in which each user is permitted to perform the processing of user's own personal information while preventing leakage of user's personal information without disturbing the use of the apparatus by an infinite number of users to any substantial extent. The apparatus includes a user authentication section that acquires ID information to identify each user from among a plurality of users, and performs user authentication based on the ID information; an operation mode setting section that can selectively set, as an operation mode that sets a work environment for operation inputs, between an personal operation mode to permit each user to operate individually and a public operation mode to permit an indefinite number of users to operate; and a mode switching section that, when a user is authenticated in the user authentication section, switches the operation mode from the public operation mode into the personal operation mode for the authenticated user.
Owner:KK TOSHIBA +1

Complementary character encoding for preventing input injection in web applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

DC to DC convertor

A DC to DC converter can include a reverse-blocking semiconductor switch that makes a synchronously rectifying MOSFET become parallel-connected with a capacitor that is connected to a power supply of a controller IC for a conventionally used synchronously rectifying circuit. The reverse-blocking semiconductor switch can be driven either by signals for adjusting a voltage of the capacitor within a permitted range of voltage of the power supply of the controller circuit, or by signals that are determined by a signal obtained from voltage across the MOSFET and the signals for adjusting a voltage of the capacitor within a permitted range of voltage of the power supply of the controller circuit.
Owner:FUJI ELECTRIC CO LTD

Methods and infrastructure for performing repetitive data protection and a corresponding restore of data

According to the present invention methods and an infrastructure are provided for performing repetitive data protection and a corresponding restore of data for block oriented data objects comprising several indexed segments.For implementing the invention, timestamps tk are set by a time k; and only the first data modification of a segment is recorded, after a timestamp tk has been set, by storing the old data contents of said segment together with the segment index i an said timestamp tk as undo-log block in a journal, first, before overwriting said segment with the modified new data. The main idea of the invention is that the undo-log blocks of the segments are distributed to N journals jn, wherein N>1 and n=0, . . . , N-1, such thata) at time tn+(m·N) (0≦n<N) at most m+1 undo-log blocks corresponding to the same segment are recorded in the journal j0,b) during the time interval [tk+(m·N), t(m+1)·N) no duplicates are recorded in the union of journals j0, . . . jk, (0≦k<N), andc) an undo-log block is written to journal jn+(m·N) (0<n<N) if and only if the corresponding segment was modified in time interval [t(n-1)+(m·N), tn+(m·N)) for the last time before the current modification;wherein m=0, 1, . . . ∞ and wherein the timestamps t(m·N) represent consecutive reset points.Then, only journals j0, . . . , jk are needed for a point in time restore of time rk+(m·N) and all changes that were written after t(m+1)·N located in journal j0. Thus, the present invention allows to reduce the amount of data that needs to be read from the journals in order to recover the system to a given point in time.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products