Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

541 results about "Key Holder" patented technology

Music identification system

The present invention relates to a music identification / purchasing system, specifically to a method for marking the time and the name of the radio station in portable device such as a key holder, watch, cellular phone, beeper or the like which will allow the user to learn via internet or regular telephone the name of the song, artist and / or music company by matching the stored data with broadcast archive. The system will allow for purchase of the full length of the identified music item or related music. An alternate embodiment provides the listener with convenient means to record a segment of the music in which he / she is interested. The recorded music segment is played back into an apparatus which can identify the song based on the play back and provide the user with information on the identified song such as title, singer or artist, composer, producer, etc., and provide related purchasing information. The user can make selections and provide payment data to the music identification / purchasing system which will result in the selections being delivered to the user by mail.
Owner:TUNE HUNTER

Group key distribution

A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be the intended party. The method preferably uses a public key / private key encryption technique in which, for example, a trusted Certificate Authority in a public key infrastructure signs the certificates to provide the public keys involved in the encryption. Alternatively, the method, together with a symmetric cipher, uses a shared secret, established in an authenticated mechanism that is outside the information exchanges of the invention. Additionally, the method uses a strong mixing function that takes several items of data as input and produces a pseudo-random authentication (or digest). Inputs to the mixing function include identity stamps that are generated by each member M and key holder H. These inputs can be the identity of the stamp generator, such as a network address, port, or protocol, a timestamp, and / or a secret value that is known only to the stamp generator. The stamps include information to bind member M if generated by key holder H, and to bind key holder H if generated by member M. Consequently, the invention authenticates each communication exchange between member M and key holder H.
Owner:CISCO TECH INC

Group key distribution

A method for distributing a secret key from a key holder H to intended group members M. The method assumes that during the distribution process each party, a group member M and the key holder H, can decrypt and encrypt exchanged information such that the encrypter knows that the decrypter will be the intended party. The method preferably uses a public key / private key encryption technique in which, for example, a trusted Certificate Authority in a public key infrastructure signs the certificates to provide the public keys involved in the encryption. Alternatively, the method, together with a symmetric cipher, uses a shared secret, established in an authenticated mechanism that is outside the information exchanges of the invention. Additionally, the method uses a strong mixing function that takes several items of data as input and produces a pseudorandom authentication (or digest). Inputs to the mixing function include identity stamps that are generated by each member M and key holder H. These inputs can be the identity of the stamp generator, such as a network address, port, or protocol, a timestamp, and / or a secret value that is known only to the stamp generator. The stamps include information to bind member M if generated by key holder H, and to bind key holder H if generated by member M. Consequently, the invention authenticates each communication exchange between member M and key holder H.
Owner:CISCO TECH INC

Gesture control key fob

A key fob for a vehicle that provides a certain vehicle function depending on the motion applied to the key fob. The key fob includes a switch that is pressed when the vehicle operator wishes to transmit a command. Pressing the switch causes a device, such as a camera or accelerometer, to be put in a motion detecting mode, where a subsequent motion of the key fob causes the key fob to transmit a command associated with that motion. For example, the vehicle operator can press the switch on the key fob and make an upward motion, which will cause the vehicle door locks to unlock. Likewise, pressing the switch on the key fob and making a downward motion may cause the door locks to lock.
Owner:GM GLOBAL TECH OPERATIONS LLC

Methods and systems for secure keyless entry for vehicle fleet management

The technology described herein provides a keyless entry system and associated method for fleet vehicle management. Secure keyless entry is provided to a user for a vehicle in the fleet vehicle management environment without the user having possession of a vehicle key or a vehicle key fob to gain entry to the vehicle. Additionally, in various embodiments, this technology provides a personalized, programmable access device carried by a user desiring access to a particular locked vehicle in a fleet vehicle management environment, an access control device configured to access electronically an on-board vehicle keyless entry system, and an access chip module electronically attached to the access control device and configured to activate the on-board vehicle keyless entry system and thereby unlock the particular locked vehicle. Furthermore, this technology provides a system with local management, reporting, audit trails, wireless connectivity to each access control device, and self-testing.
Owner:KELLY MICHAEL P +2

Hex key holder with mechanism for pivotably securing a smaller block to a larger block for facilitating access to hex keys in the smaller block

A hex key holder in one embodiment includes a larger block including a plurality of penetrating channels of circular section for retaining a plurality of first hex keys, and a curved arm extending forwardly from one side of the larger block, a smaller block including a plurality of penetrating channels of circular section for retaining a plurality of second hex keys smaller than the first hex keys, and a pivot for pivotably securing the smaller block between the larger block and the arm. The invention can facilitate access to the second hex keys by tilting the smaller block.
Owner:JACO INT CORP

Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

The invention discloses a security certificate method based on fingerprint, cryptographic technology and fragile digital watermark, comprising the following steps: a sender collects a fingerprint image, calculates summary information of the fingerprint image and inserts the summary information, a secret key and digital information which is digitally signed and encrypted into the fingerprint image as a watermark; the fingerprint of the sender is collected, the fingerprint image inserted with the watermark is sent to a receiver after the fingerprint of the sender is qualified; after receiving information, the receiver firstly detects and verifies whether the fingerprint image is inserted with the digital watermark and whether the digital watermark is right or not so as to indentify identity authenticity; digital watermark information is extracted from the received image; the summary information of the fingerprint image from which the watermark is extracted is calculated; and the summary information is compared with the summary information of the fingerprint image recorded in the watermark information to approve information authenticity. The invention can effectively overcome the defects that the existing digital signature security certificate can not approve the legal KEY holder and the fingerprint in the fingerprint certificate is easy to clone and embezzle.
Owner:SHENZHEN POKA ELECTRONICS EQUIP +1

Method of passively detecting an approach to a vehicle

A method for activating vehicle features when approaching a vehicle includes receiving (302) a message by a vehicle system (102) from a key fob (202), determining (312) if the key fob (202) is approaching the vehicle, activating (314) selected vehicle features if approaching the vehicle, and instructing (328) the key fob (202), if not approaching the vehicle, to reduce power until the message is no longer received by the vehicle system (102).
Owner:GM GLOBAL TECH OPERATIONS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products