Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1160results about How to "Reliable identification" patented technology

Method and arrangement for reliably identifying a user in a computer system

The invention relates to an arrangement and a method for reliably identifying a user in a computer system. The method utilizes a mobile station for communicating with the system. The method comprises generating a first one-time password in the mobile station by utilizing a known algorithm on the basis of the identification number of the user, subscriber-specific identifier, device-specific identifier of the mobile station, and time. The password obtained and the subscriber-specific identifier of the user are encoded and transmitted to an authentication server of the computer system, comprising identifying the user on the basis of the subscriber-specific identifier, searching a database for the personal identifier number of the user and the device-specific identifier of the mobile station associated with the user, generating a second password at the authentication server by utilizing the same predetermined algorithm on the basis of the personal identification number of the user, subscriber-specific identifier, device-specific identifier of the mobile station and time, comparing the first and the second passwords with each other at the authentication server, and if the passwords match, enabling the telecommunication connection between the mobile station and the computer system.
Owner:NOKIA MOBILE PHONES LTD

Method and system for identifying the identity of a user

The present invention describes a method and system for verifying the identity of a user of a first terminal in a communication system having at least a communication network (NET), a first terminal (DTE) associated with the communication network (NET) and a service provider (SP) associated with the communication network (NET). In the method, a first logical channel is set up via the communication network between the first terminal (DTE) and the service provider (SP). The user of the first terminal is identified after the first logical channel set up via a second logical channel other than the established first logical channel between the service provider and the first terminal prior to providing any services to the caller.
Owner:QITEC TECH GROUP

Spectral imaging system for remote and noninvasive detection of target substances using spectral filter arrays and image capture arrays

An approach to noninvasively and remotely detect the presence, location, and / or quantity of a target substance in a scene via a spectral imaging system comprising a spectral filter array and image capture array. For a chosen target substance, a spectral filter array is provided that is sensitive to selected wavelengths characterizing the electromagnetic spectrum of the target substance. Elements of the image capture array are optically aligned with elements of the spectral filter array to simultaneously capture spectrally filtered images. These filtered images identify the spectrum of the target substance. Program instructions analyze the acquired images to compute information about the target substance throughout the scene. A color-coded output image may be displayed on a smartphone or computing device to indicate spatial and quantitative information about the detected target substance. The system desirably includes a library of interchangeable spectral filter arrays, each sensitive to one or more target substances.
Owner:INNOPIX

Displaying Content on a Mobile Device

A method for facilitating the rendering of a web page on a mobile device includes providing an enhanced DOM tree for the web page that includes web page components and their display coordinates. A rule set is applied to the DOM tree, thereby selecting components for display on the mobile device. A mobile-device-specific version of the source code is generated based on the selected components.
Owner:APPLE INC

Identification of input files using reference files associated with nodes of a sparse binary tree

An input profile is generated from an input audio file using a measurable attribute that was also used to generate reference profiles from reference audio files. The input profile is then subjected to a process that was also used to generate a reference profiles tree, which is structured as a sparse binary tree, from the reference profiles. As a result of the process, information of reference profiles having similar characteristics as the input profile, with respect to the measurable attribute, are retrieved from resulting nodes of the reference profiles tree. The input profile is then compared with this subset of the reference profiles, representing potential matches, to determine that either it matches one of the reference profiles, or that it is a spoof, or that it does not match any of the reference profiles.
Owner:ROVI SOLUTIONS CORP

Data center equipment location and monitoring system

A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and other equipment in equipment racks. The system provides a wired alternative to the wireless RFID tag system by using electronic ID tags connected to each piece of equipment, each electronic ID tag connected directly by wires to a equipment rack controller on the equipment rack. The equipment rack controllers then link over a local area network to a central control computer. The central control computer provides an operator interface, and runs a software application program that communicates with the equipment rack controllers. The software application program of the central control computer stores IDs of the equipment rack controllers and each of its connected electronic ID tags in a database. The software application program in operation receives information from the electronic ID tags in real time enabling the central control computer to monitor the status, such as temperature and movement or tampering of each piece of equipment through its connected electronic ID tag. Further, the software application program can send a signal to an individual electronic ID tag to activate a sensory indicator to enable a technician(s) to locate a piece of equipment that is in need of repair or replacement.
Owner:ATTEND SYST

Probe set, probe carrier, and method for determining and identifying fungus

It is intended to provide a method for identifying a causative fungus of skin disease. The method includes: simultaneously performing amplification treatments under the same conditions using primers common to plural fungal species; then simultaneously performing hybridization procedures under the same conditions using probes respectively specific to fungi; and determining the presence or absence of each fungus from the hybridization intensity of each probe.
Owner:CANON KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products