Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

428results about How to "Reduce vulnerability" patented technology

Distributed voice over internet protocol apparatus and systems

In one embodiment, the invention relates to a telephony system. In one embodiment of the invention, the system includes a first communication device adapted to interface with a client application, a second communication device, the second communication device adapted to exchange voice over internet protocol (VoIP) data with the first communication device, and a server comprising a route engine, wherein the route engine is adapted to exchange provisioning data with the client application such that VoIP packet data remains channeled through a public network such that it is separated from the server.
Owner:FUSION TELECOMM INT

Clutch mechanism with moveable injector retainer wall for door lock system

InactiveUS6286347B1Efficient and reliable in operationEfficiently and effectively employAnti-theft cycle devicesAnti-theft devicesClutchInjector
A door lock system includes a clutch mechanism for a lockset and has particular applicability in conjunction with lever handles. Two coupling assemblies are selectively rotatably coupled by a coupling pin. One coupling assembly is rotatably coupled to the lockset actuator. The other coupling assembly is rotatably coupled to the exterior door handle. A drive assembly includes a motor and employs an injector which has a movable arcuate shoulder and which selectively controls the position of the coupling pin to provide for the locking and unlocking functions.
Owner:HARROW PRODS

Data transport acceleration and management within a network communication system

Improved data transport and management within a network communication system may be achieved by utilizing a transmit timer incorporated within the sender device and exploiting host-level statistics for a plurality of connections between a sender and receiver. The period of the transmit timer may be periodically adjusted based on a ratio of the smoothed round-trip time and the smoothed congestion window, thereby reducing or eliminating bursty data transmission commonly associated with conventional TCP architectures. For applications having a plurality of connections between a sender and a receiver that share a common channel, such as web applications, the congestion window and smoothed round trip time estimates for all active connections may be used to initialize new connections and allocate bandwidth among existing connections. This aspect of the present invention may reduce the destructive interference that may occur as different connections compete with one another to maximize the bandwidth of each connection without regard to other connections serving the same application. Error recovery may also be improved by incorporating a short timer and a long timer that are configured to reduce the size of the congestion window and the corresponding transmission rate in response to a second packet loss with a predefined time period in order to increase resilience to random packet loss.
Owner:OPTIMORPHIX INC

System and method for authentication in a social network service

An information processing system for providing a social network service to clients on a computer network is augmented with the ability to authenticate users by their ability to recognize digital photograph images of other users of the system with whom the user being authenticated has an affiliation, in which the user being authenticated will be presented with a set of photographs and will be required to correctly supply to the system the names of the individuals represented in those photographs.
Owner:WAHL MARK FREDERICK

Method for Controlling and Recording the Security of an Enclosure

A method for controlling and recording the security of an enclosure is disclosed. A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, and the like. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors.
Owner:MICRO ENHANCED TECH

Method for Controlling and Recording the Security of an Enclosure

A method for controlling and recording the security of an enclosure is disclosed. A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, and the like. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors.
Owner:MICRO ENHANCED TECH

Transparent trust chain constructing system based on virtual machine architecture

The invention discloses a transparent trust chain constructing system based on virtual machine architecture. The system is provided with a virtual machine monitor on the mainframe, the virtual machine monitor comprises a safety chip drive module, a system call analysis module and a disk analysis measurement module. The invention measures the operation system and the executable code loaded after the operation system is started in the virtual machine monitor, without any modification of the existing operation system and the application program. The invention can obtain low-level operation semantic information, such as the system call and the disk access, of the operation system in the client machine, analyzes the operation semantics of the client machine operation system, and controls the operation of the client operation system on the disk to realize the transparent measurement. The technology can be used in the distributed cooperation environment, and provide transparent trust chain and integrity certification for the operation system. The invention can protect the existing property of the user and enable the existing operation system to support the process level TCG trust chain without any modification.
Owner:HUAZHONG UNIV OF SCI & TECH

Distributed monitoring and control system

A distributed monitoring and control system includes a plurality of nodes forming a redundant communication network. Each of the nodes includes a processor, a memory and a transceiver. At least one of the nodes includes a sensor for acquiring information. At least one of the nodes includes an actuator. At least one of the processors is programmed with a control algorithm to receive information acquired from the sensors, calculate a control command and communicate the control command to the actuators for execution.
Owner:EMNET INC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products