Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

170results about How to "Reduce memory space" patented technology

Distributed secure repository

A distributed secure repository and related methods allow users of a communications management system to securely store and share communications with other users. A user shares a communication by securely storing the communication, identifying the recipient, and specifying permissions that limit actions that the recipient is permitted to take with respect to the communication. Mechanisms are provided for limiting a recipient's ability to view, copy, store, forward, print, and modify the communication. Metadata associated with the communication is transmitted to the recipient, notifying the recipient of the securely stored communication. The recipient uses the metadata to request an encrypted copy of the communication, to view the communication, or to otherwise interact with the communication in accordance with the sender's permissions. The sender retains control of the communication and can modify the communication and associated permissions.
Owner:H-E-B

Method for dynamic memory management

InactiveUS7035990B1Memory space rapidlyAllocation of memory spaceData processing applicationsResource allocationReal-time computingDynamic memory management
A method for dynamic memory management that includes determining a priority of a requesting program portion and, based on the determined priority of the requesting program portion, either allocating a memory area in real time to the requesting program portion or allocating a memory area not in real time to the requesting program portion.
Owner:DR JOHANNES HEIDENHAIN GMBH

Method, device and system for realizing Java application installation via cloud compilation

The embodiment of the invention discloses a method for realizing Java application installation via cloud compilation. The method comprises the following steps that: terminal equipment transmits the hardware configuration information of the terminal equipment and the version information of a target application to an application market server in order to obtain the upgrade information of the target application corresponding to the hardware configuration information and the version information of the target application through the application market server; the terminal equipment receives the upgrade information of the target application fed back by the application market server, wherein the upgrade information includes a target code file corresponding to newest version information obtained by compilation of an intermediate code file corresponding to the version information of the target application on a cloud server; and the terminal equipment performs optimal installation of the target application according to the upgrade information in order to update the version of the target application. Through adoption of the embodiment of the invention, the method has the advantages that the equipment memory occupied by the optimal installation of the application can be reduced specifically; the efficiency of optimal installation of the application is increased; and the user experience of application installation is enhanced.
Owner:HUAWEI TECH CO LTD

Trusted platform protection in an autonomous vehicle

ActiveUS20200213287A1Reduce and minimize safety and security issueSafety and security be improveParticular environment based servicesDigital data authenticationEmbedded systemSecure communication
Disclosed are techniques for securing electronic control units (ECUs) in a vehicle. A security platform for a vehicle includes a key distribution center (KDC) for the vehicle. The KDC is configured to verify that a digital certificate associated with a first electronic control unit (ECU) on the vehicle is a valid certificate, where the digital certificate indicates a first security level of the first ECU. The KDC is configured to generate, based on the first security level of the first ECU, one or more security keys for secure communication between the first ECU and a set of ECUs on the vehicle, and provision the one or more security keys to the first ECU and the set of ECUs. In some embodiments, the KDC uses the provisioned keys to authenticate each ECU when the vehicle is powered up.
Owner:BEIJING VOYAGER TECH CO LTD

Object detection system and method

An object detection system and method is applied to an active surveillance system for detecting at least one target object appeared in an area of interest. The object detection system includes a processor for defining the area of interest into at least a first and a second zone; a controller for assigning a first and a second weight to the first and the second zone, respectively, wherein the first weight is higher than the second weight; and a first image capturing device for capturing an image of the target object appeared in the first zone prior to capturing an image of the target object appeared in the second zone. With these arrangements, the detection of at least one target object appeared in more than one zone having a specific weight assigned thereto may be implemented with improved efficiency and accuracy in object selection and reduced interferences from environmental variables.
Owner:SUNVISION SCI

Three-dimensional reinforcement arrangement method for concrete structure on surface of circular truncated cone

The invention relates to a three-dimensional reinforcement arrangement method for a concrete structure on the surface of a circular truncated cone, and aims to solve the problem that in the prior art, a method for directly arranging reinforcements on a concrete structure on the surface of a circular truncated cone is not yet discovered. The three-dimensional reinforcement arrangement method comprises the following steps: at first, selecting a reinforcement arrangement surface of the concrete structure on the circular truncated cone, and determining circular truncated cone reinforcement arrangement guide wires according to geometric topology information of the concrete structure of the circular truncated cone and the thickness of a reinforcement protection layer; then, determining reinforcement arrangement points and an auxiliary plane generated by reinforcement objects on the reinforcement arrangement guide wires according to the spacing between reinforcements on the circular truncated cone, the number of the reinforcements and the thickness of the reinforcement protection layer; finally, generating reinforcement axes on the reinforcement arrangement points and the auxiliary plane according to reinforcement positioning points and reinforcement end parameters, calling a reinforcement template, and assigning reinforcement attribute data to the three-dimensional reinforcement objects. The method is suitable for design of reinforcement arrangement on the concrete structure.
Owner:POWERCHINA CHENGDU ENG

Method for operating a safety system for a motor vehicle, safety system and motor vehicle

In a method for operating a safety system of a motor vehicle, a corresponding safety system, and a motor vehicle equipped with such safety system, status signals from several sensor devices are captured by the safety system, wherein the status signals indicate respective status change of a functional unit of the motor vehicle. Thereafter, a chronological order of the status changes is determined and evaluated to detect a consistency or an inconsistency with the proper application of a seat belt of the motor vehicle. If an inconsistency is detected and it persists over a predetermined period of time, a control signal is transmitted by the safety system to a safety device of the motor vehicle.
Owner:AUDI AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products