Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

275results about How to "The result is valid" patented technology

Fast byzantine paxos

A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices, and provide a minimum of message delays between receiving a client request and providing a response, when each device within the system verifies the sender of any message it receives, and the propriety of the message. The sender can be verified through message authentication schemes or digital signature schemes. The propriety of a message can be verified by receiving a sufficiently large number of equivalent, properly authenticated messages. If the number of malicious devices is represented by the variable “M”, a sufficient number of equivalent, properly authenticated messages to verify that the message is true can be any number of messages greater than M. Furthermore, to verify that a leader device is not maliciously submitting different proposals to different devices using the same proposal number, a quorum of devices can be required to select a proposal, where a quorum is a sufficiently large number of devices such that any other quorum has, as a majority of its devices, non-malicious devices from the first quorum. Therefore, the distributed computing system can operate properly with M number of malicious failures and F number of total failures, and with a minimum of message delays, if the number of constituent devices in the distributed computing system is greater than 3F+2M. Additionally, if the distributed computing system can revert to a more traditional algorithm if too many devices fail or become malicious, it can use a message-delay-reducing algorithm while having as few as 2Q+F+2M+1 constituent devices, where Q is the number of devices that can fail and still allow the system to use a message-delay-reducing algorithm.
Owner:MICROSOFT TECH LICENSING LLC

Method for cleaning industrial equipment with pre-treatment

A method of cleaning equipment such as heat exchangers, evaporators, tanks and other industrial equipment using clean-in-place procedures and a pre-treatment solution prior to the conventional CIP cleaning process. The pre-treatment step improves the degree of softening of the soil, and thus facilitates its removal. The pre-treatment solution can be a strong acidic solution, a strong alkaline solution, or comprise a penetrant. A preferred strong acidic solution is an acid peroxide solution. In some embodiments, the pre-treatment may include no strong alkali or acid ingredient; rather, the penetrant provides acceptable levels of pre-treatment.
Owner:ECOLAB USA INC

Ceria-based mixed-metal oxide structure, including method of making and use

A homogeneous ceria-based mixed-metal oxide, useful as a catalyst support, a co-catalyst and/or a getter, is described. The mixed-metal oxide has a relatively large surface area per weight, typically exceeding 150 m<2>/g, a structure of nanocrystallites having diameters of less than 4 nm, and including pores larger than the nanocrystallites and having diameters in the range of 4 to about 9 nm. The ratio of the pore volumes, VP, to skeletal structure volumes, VS, is typically less than about 2.5, and the surface area per unit volume of the oxide material is greater than 320 m<2>/cm<3>, such that the structural morphology supports both a relatively low internal mass transfer resistance and large effective surface area for reaction activity of interest. The mixed metal oxide is made by co-precipitating a dilute metal salt solution containing the respective metals, which may include Zr, Hf, and/or other metal constituents in addition to Ce, replacing water in the co-precipitate with a water-miscible low surface-tension solvent, and relatively quickly drying and calcining the co-precipitate at moderate temperatures. A highly dispersive catalyst metal, such as Pt, may be loaded on the mixed metal oxide support from a catalyst-containing solution following a selected acid surface treatment of the oxide support. The mixed metal oxide, as catalyst support, co-catalyst or getter, is applied in various reactions, and particularly water gas shift and/or preferential oxidation reactions as associated with fuel processing systems, as for fuel cells and the like.
Owner:INT FUEL CELLS

Method and device for providing ozone sanitation of various objects

The present invention features an ozone sanitation device and system and a method of using the same to sanitize various objects in various environments. The present invention is particularly adapted to be used to sanitize food products, such as fruit and vegetable products as well as others at the site of the marketing and selling of such products. The ozone sanitation device functions to combat harmful pathogens by reduce microbial growth and bacteria existing on the treated object. The device comprises an ozone generator that produces ozone gas that mixes with temperature controlled water to create an ozonated water solution to be applied to an object for treatment. Moreover, the present invention features several methods of using the ozone sanitation device to treat various objects, as well as a method for restoring water to dehydrated objects, such as fruits and vegetables. The method provides a continuous process and comprises using a tepid wash solution cycle and a chilled wash solution cycle of water and the application of ozone and oxygen.
Owner:FRESH FOOD TECH

Byzantine paxos

A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices when each device within the system verifies the sender of any message it receives, and the propriety of the message. The sender can be verified through message authentication schemes or digital signature schemes, though message authentication can provide a more computationally efficient solution. The propriety of a message can be verified by receiving a sufficiently large number of equivalent, properly authenticated messages such that, even if every malicious device transmitted a message, at least one message would have been sent by a properly functioning device. If the number of malicious devices is represented by the variable “M”, a sufficient number of equivalent, properly authenticated messages to verify that the message is true can be any number of messages greater than M. Furthermore, the receipt of more than 2M equivalent properly authenticated messages can allow the receiving device to prove the propriety of the message to any device it forwards the messages onto. The proper operation of the distributed computing system can, therefore, proceed in the face of M number of malicious failures and F number of total failures, which can include malicious and non-malicious failures, if the number of constituent devices in the distributed computing system is greater than 2F+M.
Owner:MICROSOFT TECH LICENSING LLC

Multiplayer Competition Game Device, Game Machine and Game Program

After the offensive selection element images are moved along the joining direction to the offensive selection image display area (70c) and displayed one after another in an alternating manner thereon, based on the control of the offensive selector (73), the images are halted and displayed in a matrix-wise arrangement. The character property (79) and physical strength value (72) are stored in association with the character, and the character corresponding to a physical strength value (72) equal to or lower than a predetermined final value is determined to be the loser, the physical strength value of the attacked character being calculated using the offensive value and a formula corresponding to the character property and the offensive type. Furthermore, the image of the character determined to be the loser by the winner / loser determinator (76) is varied.
Owner:KONAMI DIGITAL ENTERTAINMENT CO LTD

User behavior analysis method and system based on big data

InactiveCN104462213AGain interest in timeEffective and accurate pushWebsite content managementSpecial data processing applicationsEngineeringContext data
The invention discloses a user behavior analysis method and system based on big data. According to the method, user behavior data are collected through a client side in real time, user behaviors and contextual information of a page URL are combined, the real scene that a user browses Web pages is reproduced to the greatest extent, comprehensive user behavior tracks are extracted, and effective data assurance is provided for analyzing the user behaviors; security assurance is provided for the user behavior data through a safety analysis module, and a user behavior data body model is used for modeling the user behaviors, so that behavior information semantic levels are shared and reused, and the interoperability and the reliability of the model are improved; the user behavior and context data are collected in real time for analysis, so that a result is more reliable; body and behavior information is stored through a column storage database, and therefore the foundation of massive data management is laid; the powerful processing capacity and the large-scale data storage capacity of the cloud computing technology, the body and a reasoning and knowledge discovery method of the body are combined, the massive user behavior data are analyzed in real time to obtain user interest in time, and then effective and accurate user push is achieved.
Owner:成都逸动无限网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products