Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43 results about "Reference monitor" patented technology

In operating systems architecture a reference monitor concept defines a set of design requirements on a reference validation mechanism, which enforces an access control policy over subjects' (e.g., processes and users) ability to perform operations (e.g., read and write) on objects (e.g., files and sockets) on a system. The properties of a reference monitor are captured by the acronym NEAT, which means...

Delegation-Based Authorization

Delegation-based authorization is described. In one example, a reference monitor receives from a first entity a request and a credential statement comprising a delegation of authority over a fact to a further entity. An authorization node then determines whether the further entity consents to provide the fact to the first entity and evaluates the request in accordance with an authorization policy and the credential statement. In another example, an assertion comprising a statement delegating authority over a fact to a further entity is received at an authorization node from a first entity. An authorization policy is then used to determine that the first entity vouches for the fact if each of these conditions are met: i) the first entity consents to import the fact from the further entity, ii) the further entity consents to export the fact to the first entity, and iii) the further entity asserts the fact.
Owner:MICROSOFT TECH LICENSING LLC

External Reference Monitor

Methods and systems for increasing the security or trust associated with an untrusted device are provided. For example, a trusted hardware component may send a request to the untrusted device. The request may indicate one or more challenges to be performed by a secure application executing on the untrusted device. The trusted hardware component may determine an expected response to the one or more challenges. The expected response may be determined at the secure hardware component based on an expected configuration of the untrusted device. The trusted hardware component may receive a response to the request from the untrusted device. The trusted hardware component may determine a security status of the untrusted device based on the expected response and the received response
Owner:LIONRA TECH LTD

Mechanism to trap obsolete web page references and auto-correct invalid web page references

A mechanism to trap obsolete web page references and auto-correct invalid Web page references is provided. With the mechanism, Web pages of a Web site are indexed in an indexed data structure having entries that list the references contained in the Web page. A Website reference monitor monitors changes to the Web pages and content referenced by these Web pages. If a change to the Web pages or referenced content is detected, other Web pages in the Web site that reference the modified content or Web pages are identified using the indexed data structure. The identified other Web pages may then be automatically updated. In addition, when a client device requests a Web page, the references in the Web page are checked to determine if they reference obsolete or invalid content and such references are modified to be non-selectable before providing the Web page to the client device.
Owner:IBM CORP

Flagging of Z-Space for a Multi-Camera 3D Event

A method for selecting one from among a plurality of three-dimensional (3D) cameras comprising calculating, in a computer, a plurality of z-space cut zone flag values corresponding to the plurality of 3D cameras, then comparing the z-space cut zone flag corresponding to a reference monitor image to a plurality of candidate z-space cut zone flags corresponding to candidate monitor images. In response to the results of the calculations and comparisons, a safe / not-safe indication is prepared for displaying on any of a variety of visual displays, at least one aspect of the safe / not-safe indication, the at least one aspect determined in response to said comparing. The method uses 3D camera image data, 3D camera positional data and 3D camera stage data (e.g. interaxial data, convergence data, lens data) for encoding the 3D camera data into an encoded data frame which is then transmitted to a processor for producing a visual safe / not-safe indication.
Owner:VISUAL 3D IMPRESSIONS

Boiler expansion monitoring system and monitoring method

The invention discloses a boiler expansion monitoring system and a monitoring method. The boiler expansion monitoring system comprises a reference monitoring device, a laser emission device, a laser receiving device, and an upper computer. The reference monitoring device comprises three reference plates, which are vertical to each other, and are used to form a three-dimensional coordinate. The laser emission device comprises three laser emission sources, which are used to emit monitoring laser. The laser receiving device comprises three laser receiving ends, which are used to receive the reflected laser. The upper computer is used for analysis and feedback according to laser receiving information transmitted by three laser receiving ends. The boiler expansion monitoring system and the monitoring method are advantageous in that a boiler monitoring point is fixedly connected with a reference monitoring device, and the laser monitoring is carried out by the three reference plates, which are disposed on the reference monitoring device, are vertical to each other, and are used to form the three-dimensional coordinate; after the boiler monitoring point is expanded, the three reference plates on the reference monitoring device is deviated, and then the reflected laser received by the laser receiving device is deviated, and by calculating deviation amounts, the expansion information of the boiler monitoring point is acquired.
Owner:BEIJING YUANSHEN ENERGY SAVING TECH

Image processing apparatus and image processing method as well as image processing system

The invention discloses an image processing apparatus and an image processing method as well as an image processing system. The image processing apparatus includes a monitor for displaying an image based on a right viewpoint image and left viewpoint image, or multi-viewpoint images, with the displayed image being used by a user for specifying an indispensable output area which the user wants to be included in a 3D image synthesized by merging the right viewpoint image and left viewpoint image, or multi-viewpoint images, together, and outputted; an input device for inputting information on the indispensable output area as specified by the user referring to the image as displayed on the monitor; a control unit for causing the indispensable output area to be indicated in the image as displayed on the monitor; and an output device for outputting the right viewpoint image and left viewpoint image, or multi-viewpoint images, and information on the indispensable output area.
Owner:FUJIFILM CORP

Automated precision alignment of data in utility monitoring system

Algorithms that automatically align data from multiple monitoring devices to the same zero crossing at the same point in time. Frequency change data per cycle is received from each monitoring device, and a cross-correlation algorithm is performed to determine a correlation coefficient between the reference monitoring device and another monitoring device. The data of another monitoring device is shifted by one cycle, and another correlation coefficient is calculated by a cross-correlation algorithm. The data of the two monitoring devices are aligned at the point where the maximum correlation coefficient is calculated or at the point where the correlation coefficient exceeds a threshold value. It is also possible to synchronize the clocks of the monitoring devices at the same alignment point.
Owner:SQUARE D CO

Real-time-control-oriented client-side system for protecting digital copyright of electronic book and implementation method thereof

InactiveCN102222186AMeet the needs of flexible controlStrong real-time authorization control capabilityProgram/content distribution protectionElectrical appliancesExtensibilityElectronic book
The invention discloses a real-time-control-oriented client-side system for protecting the digital copyright of an electronic book and an implementation method thereof. The client-side system comprises a reference monitor, an electronic book reader and trusted system hardware, wherein the reference monitor is used for providing permit protection, decision making and updating; the electronic book reader is used for operating digital contents; the trusted system hardware is used for providing security protection for the reference monitor and the electronic book reader; and the reference monitor is used for carrying out decryption and decision making on a permit, and granting the right of the electronic reader so that the electronic book reader carries out corresponding operations. In the client-side system disclosed by the invention, a UCON ABC model is adopted as a decision-making model, while a nontraditional access control model can carry out positive auditing on the right use condition instantaneously, and an effective real-time control function can be achieved. In addition, UCON REL is designed based on XML (Extensive Makeup Language), so that the system has good openness and expandability and enriches the use of control function for a client side.
Owner:SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products