Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

218 results about "Open port" patented technology

In security parlance, the term open port is used to mean a TCP or UDP port number that is configured to accept packets. In contrast, a port which rejects connections or ignores all packets directed at it is called a closed port.

Disposable bioreactor systems and methods

Accordingly, in one embodiment of the invention, a bioreactor system is presented and includes a disposable container for housing biomaterials for processing, the disposable container including at least one input port, at least one exhaust port, at least one harvest port, and the integrity of the sterile environment is protected with sterile filters attached to all external open ports a structure for supporting the disposable container, one or more sensors for sensing one or more parameters of the biomaterials in the container, a heater for heating the contents of the container, the heater having a thermostat and mixing system arranged with the system such that biomaterials contained in the disposable container are mixed.
Owner:GLOBAL LIFE SCI SOLUTIONS USA LLC

Personal network security token

In general the present invention provides for a small hand held size device that is easily kept in a pocket or purse or on a key chain. The security token will contain a microprocessor having memory function and will connect to a PC or other computing device or workstation via a USB port. Upon insertion into the open USB port of the user's remote computer, the personal network security token scans the remote computer to detect the presence of at least one or more operating applications, such as the type of anti-virus software and patch level and / or the type of operating system (OS) the remote computer is running and the patch level. Upon contacting the target network, the network will send an inquiry to the user's remote computer to determine if the personal network security token is present as well as other parameters. If the condition status of the token is “OK” then the network sends an authentication page to the user for the user to enter his or her user ID and password. If the ID and password are valid, then the user is allowed access to the network.
Owner:CONTRERA SUZANNE HALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products