Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

258results about How to "Restricted access" patented technology

Augmented reality collaborative messaging system

An augmented reality messaging platform is provided which interacts between one or more mobile device and a server via a communication network. The augmented reality platform includes an image recognition application located on the mobile device which receives a live, real-time image and identifies objects, such as markers or logos, within the environment to determine the pose (position and orientation) of the camera. The data, in combination with user information, is used to send, retrieve and display digital, spatialized (those registered with the physical world) multimedia messages, including audio, video, text and virtual object. A server application provided on the server may receive and store the messages from the client application or may deliver appropriate messages to a receiving mobile device, based on a set of privacy rules. The client application on the mobile device processes and renders this content thereto and forms an augmented reality image on a display of the mobile device based on the live, real-time image and the content. The client application is further capable of uploading new message content to be stored on a centralized server through methods which are specific to the medium of the message.
Owner:FREER CARL JOHAN

Outlet covering system

An outlet covering system for restricting access to an outlet mounted on a wall surface. The outlet covering system includes an enclosure mountable to a wall surface for covering an outlet. The enclosure comprises a plate member that includes an opening for receiving the outlet and a cover member pivotally coupled to the plate member for selectively blocking access to the outlet. The cover member includes a front wall, a top wall, a bottom wall, and a pair of side walls. A securing member is provided for releasably securing the cover member to the plate member. A locking means is provided for selectively locking said cover member in a closed position.
Owner:KESTER BILLIE JO M +1

System and method for restricting access to email and attachments

One aspect of the invention is a method for restricting access to one or more email attachments includes receiving an email addressed to a first recipient and including at least a first attachment. The email is processed to determine whether a valid authorization code is associated with the email (and / or the attachment (s)). The valid authorization code identifies the email (and / or the attachment(s)) as an authorized communication. Access by the recipient to the first attachment is prevented if the processing of the email determined that no valid authorization code is associated with the email (and / or the attachment(s)).
Owner:ENT SERVICES DEV CORP LP

Apparatus and Method for Processing and/or Providing Healthcare Information and/or Healthcare-Related Information

InactiveUS20090313049A1Restricted accessFacilitates creation and managementMedical communicationFinanceDatabaseTransmitter
An apparatus, including a processor which processes a request to access, obtain, change, alter, or modify, information contained in a provider's or payer's record or file, wherein the processor determines whether a requesting individual or entity is authorized to access, obtain, change, alter, or modify, information contained in the provider's or payer's record or file, wherein the processor either allows the accessing, obtaining, changing, altering, or modifying, of the information contained in the record or file, or the processor denies the accessing, obtaining, changing, altering, or modifying, of the information contained in the record or file, and further wherein the processor generates a notification report containing information regarding the allowance or the denial of the accessing, obtaining, changing, altering, or modifying, of the information contained in the record or file, and a transmitter, wherein the transmitter transmits the notification report to a communication device associated with the provider or payer.
Owner:JOAO RAYMOND ANTHONY +1

Networking method of wireless electricity consumption information acquisition ad hoc network

The invention relates to a networking method of a wireless electricity consumption information acquisition ad hoc network. According to the technical scheme, the networking method of the wireless electricity consumption information acquisition ad hoc network includes the steps that first, the network is established; second, child nodes without access to the network search for a network center coordinator or child nodes with access to the network; third, the child nodes without access to the network which are searching for the network select the network center coordinator or the child nodes with access to the network as ancestor nodes and send network access requests to the ancestor nodes; fourth, after the ancestor nodes receive the network access requests, network access addresses are allocated to the child nodes applying for access to the network; fifth, the child nodes applying for access to the network send the network access addresses and fixed addresses to the network center coordinator; sixth, if the network center coordinator agrees with that the child nodes applying for access to the network have access to the network, the child nodes applying for access to the network successfully get access to the network, if the network center coordinator does not agree with that, reject information is returned to the child nodes applying for access to the network, and after receiving the information, the child nodes applying for access to the network execute the second step to the sixth step till successfully getting access to the network. The networking method of the wireless electricity consumption information acquisition ad hoc network is used in the field of wireless acquisition of electricity consumption information.
Owner:HANGZHOU XUNLONG TECH

Data management device, stored data management method and computer program

Provided is a data management device for managing data recorded onto a readable and writable recording medium by an application that is verified based on a digital certificate. The recording medium has a plurality of areas and access to each area is restricted to a different application. The data management device includes an application authentication module, a mapping module, and a local storage display module. The application authentication module verifies that an application is an authentic application based on a digital certificate attached to the application. The mapping module associates, if the application is verified, an area accessible by the application with a subject name described in the digital certificate used for the verification. The local storage display module displays information regarding the area accessible by the application, with the use of the subject name associated with the area.
Owner:SOVEREIGN PEAK VENTURES LLC

Protective elastic sleeve

A method of isolating plant potting material from humans and animals, comprising: Having a pot with a bottom and a wall extending vertically upwards from the bottom, and an open top. The pot is containing soil and a plant which extends vertically upwards from the soil. A porous elastic sleeve having an opening on at least one end of the sleeve is stretchied over the wall of the pot. The sleeve is extending along the wall until a partial length of the sleeve, including said opening, extends above an upper edge of the pot. The above-the-upper-edge-extending sleeve is released over the top of the pot, so that a perimeter of opening recovers towards an unstretched perimeter of said opening, to thereby at least partially cover said open top of the pot and restricts access to the potting material.
Owner:TUORINIEMI VEIJO MATIAS +1

Techniques for sharing persistently stored query results between multiple users

A method, system and article of manufacture for managing access to query results and, more particularly, for managing access by multiple users to persistently stored query results, whereby at least some of the users may have different access rights. One embodiment provides a method of managing access to a query result obtained upon execution of a query against one or more databases. The method comprises creating security information configured for restricting access to the query result. The security information is associated with the query result. Access to some or all of the query result is granted to a requesting entity on the basis of the security information and an attribute of the requesting entity.
Owner:SERVICENOW INC

Method for running bridge plug sitting tool by means of differential pressure and bridge plug sitting tool utilized by same

ActiveCN102635328ARestricted accessThe sealing process is stableSealing/packingUpper jointDifferential pressure
The invention relates to a method for running a bridge plug sitting tool by means of differential pressure and a bridge plug sitting tool used by the same. When a bridge plug is sit, the bridge plug is electrified from the ground through a cable, an electromagnetic valve is turned on or a rupture disk is ruptured, a liquid inlet hole is opened, or a clock is turned on to drive an upper mandrel to move, annulus fluid enters into the tool to drive a piston to move upwards due to the differential pressure with an air chamber, the bridge plug is sit, and the piston moves continuously and upwards so as to be released from the bridge plug. The bridge plug sitting tool has three types such as an electromagnetic valve control type, a rupture disk control type and a clock control type, and consists of a cable connecting joint, an upper joint, an upper outer cylinder, a middle outer cylinder, a lower outer cylinder, an adjusting nut, a push rod, one bridge plug connecting joint, an internally-arranged electromagnetic valve, an internally-arranged contact switch, an upper mandrel, a piston, an upper piston rod, a lower piston rod, another bridge plug connecting joint and the like which are in threaded connection with one another. According to the invention, the bridge plug is stable in sitting process, and small in vibration, and when the bridge plug is connected with a perforation hole in parallel, a perforation apparatus can not be vibrated to be broken; and when the bridge plug is released, the contact switch can be touched, so that a conducting wire is disconnected, and the tool provided by the invention is obvious in ground display.
Owner:CHINA PETROLEUM & CHEM CORP +1

Method and apparatus for resisting hardware hacking through internal register interface

Methods and apparatus that allow restricted access to internal registers of an integrated circuit (IC) device via an interface are provided. Unrestricted access to internal registers via the interface may be allowed during a manufacturing process to allow device testing. After such testing is complete, the device may be placed in a restricted access mode, for example, by blowing a master “lock” fuse, to prevent unrestricted access to one or more of the internal registers via the interface. However, full or partial access to the internal registers may still be provided via an access code or “combination lock” allowing the master fuse lock, in effect, to be bypassed.
Owner:IBM CORP

Automatic switchover method of service application channel based on open intelligent gateway platform

The invention discloses an automatic switchover method of a service application channel based on an open intelligent gateway platform. The automatic switchover method comprises the following steps: S1, a user logs in to an intelligent gateway platform system; S2, user equipment and gateway equipment are bound; S3, a convergent central server transmits user account information to the gateway equipment; S4, the user equipment transmits a command for connection to an extended service application channel to the gateway equipment; S5, the gateway equipment is connected to an access server; S6, the gateway equipment issues a command request to the access server to execute configuration and installation of an extended service application plug-in and a timer is started; and S7, the gateway equipment judges whether the no-operation time between the gateway equipment and the access server exceeds a set time. If so, the gateway equipment and the access server are disconnected, and the gateway equipment automatically switches to a basic service application channel; if not, the step S6 is continued to process until configuration and installation are completed. According to the automatic switchover method, quick and flexible deployment of a new service application of the intelligent gateway platform is implemented, and the automatic switchover method has the advantage of good industrial application prospect.
Owner:SHENZHEN FENGLIAN TECH

Showing management system to automatically match and control electronic lockboxes

A showing management system for automatically controlling access to an electronic lockbox utilizing showing appointment data maintained by the showing management system, whereby the showing appointment data is transmitted to the electronic lockbox and / or electronic key device. The electronic lockbox will open only when the actual access time is within the scheduled showing appointment time. The showing management system further programmatically matching a specific electronic lockbox with a specific Listing ID, whereby lockbox access data from an electronic lockbox are matched with showing appointment records maintained in the showing management system to complete the lockbox access records when the Listing ID for a particular showing appointment is missing from the lockbox access record.
Owner:MFTB HOLDCO INC

Electronic door access control system

An electronic door lock system comprising a door control unit, a key reader and an encrypted binding between the key reader and the door control unit. When tampering is detected the encrypted binding is terminated thereby preventing the door from being opened. There is also disclosed a method for retrofitting a door comprising a key reader with a door control unit. The door control unit, key reader and the latch release mechanism may also be powered by a key comprising a power supply, the key also supplying a coded sequence to the door control unit.
Owner:PAQUIN YVES

Certificate declaration management system and certificate declaration management method

The invention discloses a certificate declaration management system and a certificate declaration management method. The system comprises a certificate management platform, a declarant's mobile terminal, an electronic access management side, a self-service declaration equipment side, a self-service certificate handling equipment side, and a floating population management relevant department side. The method comprises the steps of getting declarant information from the floating population management relevant department side, judging whether the declarant information is approved by the floating population management relevant department side, generating a QR code according to the approved declarant information when judging that the declarant information is approved, and pushing the generated QR code and the declarant information to the declarant's mobile terminal, the electronic access management side, the self-service declaration equipment side, the self-service certificate handling equipment side and the floating population management relevant department side. According to the invention, a QR code used as the unique electronic identifier of a declarant can be generated according to the approved declarant information, use of certificates on the Internet is facilitated, and convenience in management and use is increased.
Owner:广州市华标科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products