Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Change its value" patented technology

Malware containment by application encapsulation

The invention discloses a method and system for protecting a computer platform from malware. The protection is achieved by encapsulating an application that can serve as a malware conduit within a protected capsule environment, so as to prevent the conduit application or any processes originated therefrom from accessing and making changes to objects associated with an operating system (OS) of the computer platform or with other applications running on the computer platform outside of the capsule environment, thereby preventing the malware provided via the conduit application from contaminating the computer platform outside of said secure protected environment, or capsule. Capsule runtime software manages the dynamic state of the encapsulated application, and re-directs system service requests generated by the application and associated processes from OS-provided system objects to corresponding object libraries provided within the capsule object set, so that any malware induced changes remain local to the capsule. Protection of the operating system and most applications running on the computer platform is thus provided by the isolation of the conduit applications within a secure capsule environment, which can be safely removed from the computer platform, together with any changes introduced by the malware to the computer platform, without affecting the computer operation.
Owner:TRIGENCE CORP

Driving device, light amount controller and shutter

There is provided a small-sized and slim driving device which is easy to manufacture and capable of producing high output. A magnet has a cylindrical shape, and at least the outer peripheral surface of the magnet is circumferentially divided into n sections magnetized so as to have alternately different poles. The magnet can rotate about a rotational axis of the cylindrical shape. A coil is arranged axially of the magnet and parallel thereto. An outer magnetic pole portion is disposed to be magnetized by the coil, and has a plurality of hair comb tooth-shaped portions opposed to the magnet and arranged around the magnet such that an angle corresponding to the circumferential width of each of the hair comb tooth-shaped portions opposed to the magnet about the rotational axis of the hollow cylindrical shape of the magnet is equal to a predetermined angle A. An inner magnetic pole portion is disposed to be magnetized by the coil, and has a hollow cylindrical shape opposed to the inner peripheral surface of the magnet. The predetermined angle A is set to such a value that a rotational force acts on the magnet to return to a position in which a circumferential center of each of n magnetized sections on the outer peripheral surface of the magnet is opposed to a circumferential center of a corresponding one of the hair comb tooth-shaped portions of the outer magnetic pole portion, when the circumferential center of each of n magnetized sections shifts from the position.
Owner:CANON KK

Malware containment by application encapsulation

The invention discloses a method and system for protecting a computer platform from malware. The protection is achieved by encapsulating an application that can serve as a malware conduit within a protected capsule environment, so as to prevent the conduit application or any processes originated therefrom from accessing and making changes to objects associated with an operating system (OS) of the computer platform or with other applications running on the computer platform outside of the capsule environment, thereby preventing the malware provided via the conduit application from contaminating the computer platform outside of said secure protected environment, or capsule. Capsule runtime software manages the dynamic state of the encapsulated application, and re-directs system service requests generated by the application and associated processes from OS-provided system objects to corresponding object libraries provided within the capsule object set, so that any malware induced changes remain local to the capsule. Protection of the operating system and most applications running on the computer platform is thus provided by the isolation of the conduit applications within a secure capsule environment, which can be safely removed from the computer platform, together with any changes introduced by the malware to the computer platform, without affecting the computer operation.
Owner:TRIGENCE CORP

Method, device, system, and computer storage medium for crystal growing control

This invention provides method, device, system, and computer storage medium for crystal growth control of a shouldering process. The method comprises: presetting a setting value of a crystal growth angle at different stages of a shouldering process and a crystal growth process parameter at different stages of the shouldering process; obtaining crystal diameters at different stages of the shouldering process and calculating a measured crystal diameter variation and a measured crystal length variation, and using a ratio of the measured crystal diameter variation and the measured crystal length variation to calculate a measured crystal growth angle; comparing the measured crystal growth angle with the setting value of the crystal growth angle to obtain a difference as an input variable of PID algorithm; calculating an adjustment value of a crystal growth process parameter by PID algorithm as an output variable of PID algorithm; adding the adjustment value of the crystal growth process parameter and the setting value of the crystal growth process parameter to obtain a process parameter of an actual crystal growth process.
Owner:ZING SEMICON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products