Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

67results about How to "Secure Communications" patented technology

Methods and Systems for Improved Data Input, Compression, Recognition, Correction, and Translation through Frequency-Based Language Analysis

System and method for improving data input by using word frequency to text predict input. Other systems and methods include analyzing words already contained in a document (e.g. spell checking and OCR) and using word frequency to create a proxy system to reduce the space required to store data, allowing for more efficient usage of storage and enhancing the embedded content of matrix codes. The system displays the most common words in a language based upon the previously entered or displayed word(s), or the previously entered or displayed character or characters. Words with the most common frequency of use with the prior word(s) are displayed in a table to enable the user to quickly select one of the displayed words for rapid data entry. The input device can be a touch-sensitive display or non-touch sensitive type device.
Owner:SIEGEL ABBY L

Content distribution method and content supply system

To secure a communication path between a distribution server that distributes content to clients and a terminal apparatus of a content distributor more reliably while content is distributed by live distribution. In a content supply system 100, in order to use a streaming server 102 to perform a live distribution, a user PC 106 to be used makes a reservation for a time zone, etc. to a server reservation control center 101 over the Internet 103. When the reservation is accepted and the content is sent from the user PC 106 to the streaming server 102, data is sent via a dedicated server connection network 108.
Owner:SONY CORP

System and method for pairing wireless headsets and headphones

A wireless headset including a CPU for generating a random number; a speaker; and a voice synthesis circuit for announcing the generated random number via the speaker, wherein the announced number is input to a host device as a PIN to establish a secure wireless communication link between the host device and the headset. In one embodiment the wireless headset includes a first operational button for selecting alphanumeric characters; and a second operational button for confirming the selected alphanumeric characters for input to the headset. In one embodiment the headset includes a microphone for accepting a spoken PIN as an input; speech recognition means for recognizing the spoken PIN; and speech synthesis means for announcing the recognized PIN via the speaker.
Owner:AVAGO TECH WIRELESS IP SINGAPORE PTE

Systems, methods and analyzers for establishing a secure wireless network in point of care testing

A system and method for initiating and maintaining a secure wireless communication between a wireless analyzer and a target network (e.g., a hospital network connected to a LIS and / or HIS). The present disclosure provides novel processes and systems for securely networking a wireless analyzer with a Wi-Fi network without the need for an operator or user to engage in manual initiation steps on, or through, the wireless analyzer.
Owner:ABBOTT POINT CARE

Method and system of securing group communication in a machine-to-machine communication environment

A method and system for securing group communication in a Machine-to-Machine (M2M) communication environment including a plurality of Machine Type Communication (MTC) groups, wherein each of the plurality of MTC groups includes a plurality of MTC devices. The method includes generating a unique group key for securing communication with MTC devices associated with an MTC group in an M2M communication environment, securely providing information on the unique group key to the MTC devices associated with the MTC group, and securely communicating at least one broadcast group message with the MTC devices using the unique group key information.
Owner:SAMSUNG ELECTRONICS CO LTD

Uniquely identifying and securely communicating with an appliance in an uncontrolled network

A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider. An enterprise connector is supported in this uncontrolled network, preferably as an appliance-based solution. According to this disclosure, the enterprise configures an appliance and then deploys it in the uncontrolled network. To this end, an appliance is required to proceed through a multi-stage approval protocol before it is accepted as a “connector” and is thus enabled for secure communication with the service provider. The multiple stages include a “first contact” (back to the service) stage, an undergoing approval stage, a re-generating identity material stage, and a final approved and configured stage. Unless the appliance passes through these stages, the appliance is not permitted to interact with the service as a connector. As an additional aspect, the service provides various protections for addressing scenarios wherein entities masquerade as approved appliances.
Owner:AKAMAI TECH INC

Method and apparatus to facilitate secure network communications with a voice responsive network interface device

A system for facilitating secure network communications includes a security computer system and corresponding software. The security system is utilized in conjunction with a voice browser residing on a server system. A user accesses the network by placing a call to the voice browser system. The voice browser includes a software module that creates a secure connection to the security system. The user provides an identification to the voice browser system that is transferred to and verified by the security system. Once the identification is verified, the user is prompted by the voice browser system to speak a phrase for voice verification. The verification speech signals are transferred from the voice browser system to the security system to verify those speech signals against speech signals of a particular authorized user associated with the identification and stored in a database. When the user is verified, the security system retrieves a user private key and certificate from the database. In response to the user subsequently accessing a web site residing on a secure server, the secure server and voice browser system initiate a secure key exchange. During the key exchange, data packets containing security information are transferred from the voice browser system to the security system for processing, while security information from the security system is transferred to the secure server via the voice browser system. The resulting session key is securely transferred to the voice browser system to facilitate secure communications between the voice browser system and secure server.
Owner:EXCELIS INC

System and Method for Communication Between an Information Handling System and Management Controller Through a Shared LOM

Communications between a host information handling system and its management controller sent through a shared LOM are re-directed at the LOM from communication through a network to instead communicate directly between the host information handling system and management controller. A management module compares destination addresses of packets sent from the host information handling system and the management controller with host information handling system and management controller network addresses stored on the LOM. Packets having destination address that match a host information handling system or management controller network address are redirected from communication across the network to communicate directly between the host information handling system and management controller.
Owner:DELL PROD LP

Wireless network security

A method includes identifying a suspect node of a network that includes multiple nodes in wireless communication. The method also includes initiating formation of a sub-network of the network in response to identifying the suspect node. The suspect node is not a member of the sub-network. After formation of the sub-network, first communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. The sub-network is configured to enable second communications between members of the sub-network, where the second communications are communicated in a manner that is secured against access by the suspect node.
Owner:THE BOEING CO

Cross-enterprise wallplug for connecting internal hospital/clinic imaging systems to external storage and retrieval systems

A WallPlug (interface) connects DICOM devices located at a hospital to external storage and retrieval systems. The external storage and retrieval systems can be part of the National Digital Mammography Archive. The WallPlug allows secure communications within the hospital setting, and allows only selected data to be transferred between the hospital devices and the archive. The WallPlug enables cross-enterprise distribution of medical content with proper authentication and logging of transfers. The WallPlug includes two portals connected together by a private secure network. The use of two separate devices greatly enhances the security, redundancy, and manageability of the combined device.
Owner:THE TRUSTEES OF THE UNIV OF PENNSYLVANIA

Energy consumption module, offshore wind power flexible DC transmission system, and fault ride-through strategy

The invention discloses an energy consumption module, an offshore wind power flexible DC transmission system, and a fault ride-through strategy applied to the offshore wind power flexible DC transmission system. A DC chopper module is integrated into the MMC of an onshore converter station. The DC chopper module uses a modular arrangement and is connected in series with the SM sub-modules of the MMC. The DC chopper module does not contain capacitor components. When an onshore AC fault occurs in the offshore wind power flexible DC transmission system, the DC voltage rises sharply. A certain number of DC chopper modules (DMs) are introduced to consume surplus power through the energy-consuming resistors to maintain the system's short-term stability. After the fault is removed, the corresponding DMs are removed in order to complete the system fault ride-through. Through the modular arrangement of DMs in a bypass state during normal operation, not only can the precise matching of the surplus power be achieved, the electrical quantity fluctuations of the switching process of the chopper device can be greatly reduced, and fault ride-through and isolation are realized, but also the DM issimple in structure and good in economical efficiency.
Owner:XIDIAN POWER RECTIFIER XIAN +2

Cloud computation-based vital sign data management system and method

The invention relates to a cloud computation-based vital sign data management system and method. The system comprises a vital sign data source module, an information processing module, a communication module, a cloud computation module, a cloud database and an intelligent terminal, wherein the information processing module, the cloud computation module, the cloud database and the intelligent terminal are connected with the communication module; and the vital sign data source module is connected with the information processing module. According to the system and method provided by the invention, the working efficiency of medical workers are improved from the basic acquisition link by means of a cloud computation technology, the error probability is reduced, and vital sign data is automatically acquired, transmitted to a server, analyzed and processed through the cloud computation module and then stored to the cloud database, so that the medical workers can monitor the vital signs of patients in real time and look up and update the vital sign data through the corresponding authorized intelligent terminal, a large number of ward rounding and bedside inspection are saved, and the medical workers can carry out high-efficiency and high-accuracy inspection items on the patients according to real-time monitoring data.
Owner:成都云处方科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products