Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

133 results about "Regulatory agency" patented technology

A regulatory agency (also regulatory authority, regulatory body or regulator) is a public authority or government agency responsible for exercising autonomous authority over some area of human activity in a regulatory or supervisory capacity. An independent regulatory agency is a regulatory agency...

Encryption in a secure computerized gaming system

An architecture and method for a gaming-specific platform are disclosed that features secure storage and verification of game code and other data, provides the ability to securely exchange data with a computerized wagering gaming system, and does so in a manner that is straightforward and easy to manage. Some embodiments provide the ability to identify game program code as certified or approved, such as by the Nevada Gaming Regulations Commission or other regulatory agency. These and other functions make use of encryption, including digital signatures and hash functions as well as other encryption methods.
Owner:IGT

Authentication in a secure computerized gaming system

The present invention provides an architecture and method for a gaming-specific platform that features secure storage and verification of game code and other data, provides the ability to securely exchange data with a computerized wagering gaming system, and does so in a manner that is straightforward and easy to manage. Some embodiments of the invention provide the ability to identify game program code as certified or approved, such as by the Nevada Gaming Regulations Commission or other regulatory agency. The invention provides these and other functions by encrypting a random number, storing the encrypted random number, and hashing the random number and a casino game data set to provide a first bit string, and storing the first bit string.
Owner:IGT

Encryption in a secure computerized gaming system

The present invention provides an architecture and method for a gaming-specific platform that features secure storage (354) and verification (366) of game code and other data, provides the ability to securely exchange data with a computerized wagering gaming system, and does so in a manner that is straightforward and easy to manage. Some embodiments of the invention provide the ability to identify game program code as certified or approved, such as by the Nevada Gaming Regulations Commission or other regulatory agency. The invention provides these and other functions by use of encryption (216), including digital signatures (220) and hash functions (210) as well as other encryption methods.
Owner:IGT

Monitoring system and method for patient care

A patient care monitoring system and method employ active RFID devices integrated with digital processing, memory and timing circuitry for patient identification, care giver identification and for identification of each prescribed treatment, procedure, medication and general and / or special care action. At the point-of-care, each care action identity device will match directly with the targeted patient identity device or issue an error warning to prevent mistakes. The patient identity device will also interact with an associated sensor network to proactively prompt care givers to provide general care actions, such as altering a patient's laying position, changing bed pan / clothing / bed sheet, etc. for invalid patients. Also the patient identity tag will furnish periodic records of every care action, mistakes, remedies, care givers' identities and time and date for a central processor of a healthcare facility to monitor the quality of patient care. Such record can also be potentially accessed via the Internet by the responsible regulatory agencies, accreditation associations, insurance firms and even patients' families to ensure patient care is meeting the standards as well as medical billing accuracy.
Owner:HUANG CHING CHING +4

Authentication in a secure computerized gaming system

An architecture and method for a gaming-specific platform are disclosed that features secure storage and verification of game code and other data, provides the ability to securely exchange data with a computerized wagering gaming system, and do so in a manner that is straightforward and easy to manage. Some embodiments provide the ability to identify game program code as certified or approved, such as by the Nevada Gaming Regulations Commission or other regulatory agency. The disclosed embodiments provides these and other functions by encrypting a random number, storing the encrypted random number, and hashing the random number and a casino game data set to provide a first bit string, and storing the first bit string.
Owner:IGT

Data Integrity and Non-Repudiation

Disclosed is a system and method that uses digital signature technology to authenticate the contents of one or more manifests located on a storage device. Each manifest contains a list of file records, where each record contains the name of a file stored on the storage device, and a signature value derived from the contents of the file. At boot time, the gaming machine first authenticates the contents of the manifest and then authenticates the contents of the files using the signature value stored in the manifest. Files are verified using the signature, as they are needed, during the boot up of the operating system and throughout normal operation. This method reduces the boot time of the gaming machine and eliminates the need to check digital signatures for each individual file or over the entire contents of a non-secure media. Similarly, a method of adding authentication ability to legacy software components without necessarily altering the legacy software components is disclosed. Introduction of a stronger authentication algorithm, or when a private key has been compromised would normally require the software component to be re-built to support the new algorithm or private / public key pair; however, a method is disclosed where algorithms and key pairs may be changed and applied to legacy software without having to re-built, re-test, re-sign, or re-submit the component to regulatory agencies for approval. Also disclosed is a system and method of establishing a trusted environment containing a gaming operating system and associated authentication module, file system drivers, and / or network drivers that may be used to in the process of authenticating contents of one or more manifests located on a storage device.
Owner:LNW GAMING INC

Method for remote monitoring of water treatment systems

A method of monitoring the daily operating performance parameters for water treatment processes through the collection of localized data. The data is manipulated to generate preconfigured performance, maintenance, and quality assurance reports and further provide automatic submission of data as required for regulatory review of certain water treatment systems such as potable water treatment. The data is collected from sensors located at an equipment site and transferred to a remote computer located by use of the Internet, further all data received and used for generation of reports is also accessible by Internet connection and be delivered directly to the regulatory agency without additional process.
Owner:WATEREYE +1

Encryption in a secure computerized gaming system

The present invention provides an architecture and method for a gaming-specific platform that features secure storage and verification of game code and other data, provides the ability to securely exchange data with a computerized wagering gaming system, and does so in a manner that is straightforward and easy to manage. Some embodiments of the invention provide the ability to identify game program code as certified or approved, such as by the Nevada Gaming Regulations Commission or other regulatory agency. The invention provides these and other functions by use of encryption, including digital signatures and hash functions as well as other encryption methods.
Owner:IGT

Predictive Key Risk Indicator Identification Process Using Quantitative Methods

InactiveUS20140019194A1FinanceData miningRisk management framework
Methods, computer-readable media, and apparatuses are disclosed for identifying predictive key risk indicators (KRIs) for organizations and / or firms through the application of specific statistical and quantitative methods that are well integrated with qualitative adjustment. An indicator is a variable with the purpose of measuring change in a phenomena or process. A risk indicator is an indicator that estimates the potential for some form of resource degradation using mathematical formulas or models. Organization / enterprise key risk indicators are an essential arsenal in the risk management framework of any firm or organization and may be required by regulatory agencies.
Owner:BANK OF AMERICA CORP

Automated Vending of Products Containing Controlled Substances

The present invention provides for devices and methods for vending regulated products, particularly controlled substances, including those containing pseudoephedrine. The present invention allows for the identification of consumers through reliable log-in-procedures, allows the consumer to select items, validates whether the purchase request complies with regulations, to facilitate the delivery of the requested product to a consumer. Other embodiments include a vending machine that is placed into a retail environment in which software enforces validation of the purchasers' identities, limits the amount of pseudoephedrine for each purchaser within the regulations of local, state and federal agencies.This invention reduces the resources which must be expended in retail locations to comply with regulatory agencies, to implement effective counter measures against illegal purchases of regulated and controlled substances, and to ensure the effective limitation of these substances within reasonable limits required for normal consumption.
Owner:ASTERES

System and method for effectuating the acquisition and distribution of tracking data on mobile assets, including shipment containers used in freight transportation

A method and system for effectuating the optimum configuration of a duplex tracking device used to track the location and attributes of a mobile asset during a discrete event and the distribution of the data reported by the device so that the owner of the mobile asset and one or more of the owner's business partners can contemporaneously access the tracking data that they require. Each party first specifies a minimum configuration for all events with which they are associated, and then optionally specifies more extensive configurations for classes of discrete events. The owner may also constrain the data that partners can request by specifying access authorities for each class of business partners. The configuration parameters for a discrete event are systematically determined to minimize the data to be reported by the device while still meeting the requirements of all the parties, as constrained by the access authorities. Each party may then view and edit, as desired, the configuration until it is frozen prior to satellite transmission to the tracking device. The apparatus includes an internet-based program tool by which any participant can contemporaneously participate in the specification of the configuration parameters for the tracking device for a discrete event, and also access the data for events with which they are associated and generate exception reports. In a preferred embodiment, the mobile asset is a shipment container used to transport freight by ocean, rail, or road, the tracking device reports via satellite communications, the discrete event is a single shipment of goods from a origin location to a destination location, and the parties include the owner of the mobile asset (carrier), the owner of the contents (shipper), the receiver (consignee), and relevant logistics providers and regulatory agencies.
Owner:IGIT ENTERPRISES

Return link design for PSD limited mobile satellite communication systems

A system and method for managing access to a satellite-based transponder by a plurality of aircraft each having a mobile radio frequency (RF) system. The system employs a ground-based, central control system for managing access to the satellite-based transponder so that the aggregate power spectral density (PSD) of the RF signals of all the mobile systems does not exceed, at any time, limits established by regulatory agencies to prevent interference between satellite systems. This is accomplished by a dual control loop arrangement for monitoring the signal-to-noise ratio (Eb / No) of the RF signal transmitted by the satellite-based transponder. A ground-based control loop is used whereby a ground-based central controller monitors the Eb / No and transmits commands to the aircraft (via the satellite transponder) to maintain the Eb / No of the transmitted signal within a predetermined range. A fast scan angle compensation is used by the mobile system of the aircraft to implement another control loop to further adjust the transmit power. This control loop maintains the Eb / No of the signal transmitted to the satellite-based transponder at the commanded level inbetween updates from the ground-based central controller.
Owner:THE BOEING CO

Method and system for performing CRA, HMDA, and fair lending analysis and reporting for a financial institution

The present invention discloses a method and system for collecting, standardizing, and analyzing lending data from all the offices of a financial institution, including information on small business, home equity, motor vehicle, credit card, mortgage, other secured and unsecured consumer products for commercial, community development, not-for-profit, and consortium customers. The invention enables data collection and analysis in a timely fashion such that interim reports may be prepared so that changes in lending practices can be implemented to assist with assuring compliance with the fair lending acts. A central repository is linked to all of the offices of the financial institution, and data mapping features are used to provide standardized reporting so that all data will be reported in a standardized form. The system processes, collects and standardizes information on new loans, renewals, credit line increases and application decisions for all of the business units within a financial institution. The present invention permits internal management reporting for review of performances against the CRA and HMDA plans. It also permits preparation of the reports for filing with the federal regulatory agencies, such as OCC, FRS and OTS. Furthermore, the present invention permits rapid response to federal regulatory agency audits of reported CRA and HMDA information.
Owner:CITIBANK

Software defined radio download

A method for securely connecting a software defined radio (SDR) (110) to a server (140) through a network is presented. A request to download a radio configuration (R-CFG) file is sent from the SDR device to the server. A determination is made that the R-CFG file is configured to control a plurality of radio frequency parameters for the SDR device solely within levels permitted by a regulatory agency. The R-CFG is then downloaded to the SDR device.
Owner:SOVEREIGN PEAK VENTURES LLC

System and method for effectuating the acquisition and distribution of tracking data on mobile assets, including shipment containers used in freight transportation

A method and system for effectuating the optimum configuration of a duplex tracking device used to track the location and attributes of a mobile asset during a discrete event and the distribution of the data reported by the device so that the owner of the mobile asset and one or more of the owner's business partners can contemporaneously access the tracking data that they require. Each party first specifies a minimum configuration for all events with which they are associated, and then optionally specifies more extensive configurations for classes of discrete events. The owner may also constrain the data that partners can request by specifying access authorities for each class of business partners. The configuration parameters for a discrete event are systematically determined to minimize the data to be reported by the device while still meeting the requirements of all the parties, as constrained by the access authorities. Each party may then view and edit, as desired, the configuration until it is frozen prior to satellite transmission to the tracking device. The apparatus includes an internet-based program tool by which any participant can contemporaneously participate in the specification of the configuration parameters for the tracking device for a discrete event, and also access the data for events with which they are associated and generate exception reports. In a preferred embodiment, the mobile asset is a shipment container used to transport freight by ocean, rail, or road, the tracking device reports via satellite communications, the discrete event is a single shipment of goods from a origin location to a destination location, and the parties include the owner of the mobile asset (carrier), the owner of the contents (shipper), the receiver (consignee), and relevant logistics providers and regulatory agencies.
Owner:IGIT ENTERPRISES

System and method for collaboration between regulatory agency and regulated entity

A computer-implemented system and method of secure transmission and collaboration of information between the employees of an entity and a regulator agency for the purpose of obtaining disposition by the regulatory agency. The system consists of a connected web sever and a database, both of which are protected behind at least one firewall. The web server and the multifunctional database are hosted and maintained by the entity for use by the regulatory agency and connects the employees of an agency and employees of the regulatory agency. The web server utilizes a security system to allow access to various functions of the system according to identity of the user.
Owner:GENERAL ELECTRIC CO

Method of data collection for fisheries management

A method of gathering, analyzing, and reporting data about commercial fish stocks and fisheries. Under this method, individual commercial fishermen use a device specific to the type of fishing being done to record the number of fish brought aboard, the number kept or released, the reason for release, the date, time, and location of the catch, and the fishery conditions, such as water temperature, depth, and salinity at the time that fish are brought aboard the fishing vessel. The individual fishermen transfer the data, typically via telephone link, to a central data repository, or to a receiving station when the data is transferred to the central data repository at a later time. The data is encrypted during transfer and placed in fisherman files, each fisherman having his own, restricted-access file. Data from all individual fishermen, as well as from other sources, are placed in a composite data pool to be used as source data for a general fishery database on fishstocks and fisheries. This data can be stripped of data that would identify a particular fisherman as the source, to preserve fishing secrets. Confidential reports can be generated from a fisherman file and delivered to the individual fisherman who is the source of that data. Reports for regulatory agencies can also be generated from the data in the fisherman file. The fishery database provides a unit for regulatory agencies, fisheries managers, and fish research institutions to analyze, monitor, and report on the development of fishstocks and fisheries.
Owner:THISTLE MARINE

System and method for automated discovery and ranking of regulatory compliance risks

Method and systems for the collection of documents that belong to a regulatory corpus, and the building of a data structure that will capture the relationships between their constituent parts. Said data structure will be used to build other data structures that map the topics present at each level of the corpus constituents, and automated classification models to match new, unseen documents that are not part of the regulatory corpus but nonetheless need to comply with it, with those areas of the regulatory corpus that they pertain to. A method to further process those compliance documents to determine how well they are covering the relevant sections of the regulatory corpus, and therefore highlight areas where there is heightened regulatory risk. The regulatory corpus can be augmented by international standards, regulatory agency decisions, guidance documents, court cases, expert commentary, and other sources of regulatory insight. Since regulations are routinely updated, new regulations promulgated, and others repealed, and new decisions and guidance issued by regulatory agencies, bodies, and experts, the process mentioned above will be done iteratively to maintain the validity of the regulatory corpus. Individuals and companies will be able to access the system and determine the regulatory risks in their existing documents, or those documents that they are planning to issue to guide their internal operations.
Owner:COSTAS GUNTHER

Return link design for PSD limited mobile satellite communication systems

A system and method for managing access to a satellite-based transponder by a plurality of aircraft each having a mobile radio frequency (RF) system. The system employs a ground-based, central control system for managing access to the satellite-based transponder so that the aggregate power spectral density (PSD) of the RF signals of all the mobile systems does not exceed, at any time, limits established by regulatory agencies to prevent interference between satellite systems. This is accomplished by a dual control loop arrangement for monitoring the signal-to-noise ratio (Eb / No) of the RF signal transmitted by the satellite-based transponder. A ground-based control loop is used whereby a ground-based central controller monitors the Eb / No and transmits commands to the aircraft (via the satellite transponder) to maintain the Eb / No of the transmitted signal within a predetermined range. A fast scan angle compensation is used by the mobile system of the aircraft to implement another control loop to further adjust the transmit power. This control loop maintains the Eb / No of the signal transmitted to the satellite-based transponder at the commanded level inbetween updates from the ground-based central controller.
Owner:THE BOEING CO

Intelligent livestock system based on Internet of Things

The invention provides an intelligent livestock system based on the Internet of Things, relates to the field of application sensors, LoRa networks, and artificial intelligence livestock, realizes theautomatic collection of livestock and pasture statuses, stores and analyzes data, and gives an intelligent solution for integrating the Internet of Things technology into the livestock industry. The intelligent livestock system comprises an intelligent livestock software system, a special soil moisture information collection climatological station for a pasture, a livestock wearable device, a visual individual identification module and a livestock wireless network based on an LoRa broadband technology. The livestock personnel, scientific research institutions and regulatory agencies can masterthe conditions of the pasture and livestock in real time for daily management; the linkage between ranchers, experts and supervision departments is realized to provide solutions and rapid support foremergency events; complete livestock bookbuilding is achieved, and a foundation is built for further integrating pastures, slaughter houses and retailer information and realizing whole-course qualitytracing; and a large-range epidemic disease outbreak is predicted and effectively controlled by combining a think tank and a big data analysis technology.
Owner:HARBIN UNIV OF COMMERCE

System and method for regulation compliance

The system and method herein disclosed is an online tool for reaching regulatory compliance. It uses a database of requirements by device, country, and agency necessary for licensing and marketing. Further databases include the compliance documents themselves, provided by given users concerning given devices. Still further databases include lists of domain experts, who may be called upon to review and edit these compliance documents. Expert systems running on a server associated with the system and method herein disclosed guide the user along the route to reaching compliance by means of aiding classification, prompting for missing documents, suggesting workarounds, submitting documents and payments automatically, and the like. Regulatory agencies may be given access to parts of the databases of the system and method herein disclosed to allow them to peruse and evaluate the compliance documents.
Owner:ARAZY BENNY

Virtual technology transfer office

An online, and therefore virtual, technology transfer office accessible by multiple inventive entities is provided. The systems and methods of the invention provide a comprehensive interface to a remote application that collects information related to inventions, ranks the inventions, solicits approval for pursuing intellectual property protection, funding, financing, commercializing or otherwise exploiting the invention, solicits bids from a stable of service providers, manages the award of contracts to provide services, facilitates collaboration between users internal and external to the inventive entities and between different entities, implements security protocols, and reports government funded inventions to the appropriate regulatory agencies, and manages intellectual property portfolios. Each inventive entity may specify the level of control to be retained to utilize the virtual technology office application as a supplement for or as a substitute for full time technology transfer personnel.
Owner:FLORIDA A&M UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products