Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

1566results about How to "Ensure correct execution" patented technology

Pattern-center determination apparatus and method as well as medium on which pattern-center determination program is recorded, and pattern-orientation determination apparatus and method as well as medium on which pattern-orientation determination program is recorded, as well as pattern alignment apparatus and pattern verification apparatus

InactiveUS7260246B2Determine referenceShort timeProgramme controlElectric signal transmission systemsPattern recognitionPattern orientation
The invention provides an apparatus for determining a reference orientation (pattern orientation) to a fingerprint-like pattern, formed with a number of curves, accurately in a short time. The apparatus includes a pattern-center determination section for determining a reference center to the pattern, a reference-circle generation section for generating a reference circle centered at the pattern center, a reference-circle-intersecting-point calculation section for calculating intersecting points of the reference circle and the curves of the pattern, a reference-point determination section for determining a reference point for the pattern orientation based on a relationship between directions of the reference circle and directions of the pattern curves at the intersecting points, and a pattern-orientation determination section for determining the pattern orientation based on the pattern center and the reference point. The apparatus can be applied to a system which performs personal authentication using biometric information, such as a fingerprint, or a like system.
Owner:FUJITSU LTD

Fast byzantine paxos

A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices, and provide a minimum of message delays between receiving a client request and providing a response, when each device within the system verifies the sender of any message it receives, and the propriety of the message. The sender can be verified through message authentication schemes or digital signature schemes. The propriety of a message can be verified by receiving a sufficiently large number of equivalent, properly authenticated messages. If the number of malicious devices is represented by the variable “M”, a sufficient number of equivalent, properly authenticated messages to verify that the message is true can be any number of messages greater than M. Furthermore, to verify that a leader device is not maliciously submitting different proposals to different devices using the same proposal number, a quorum of devices can be required to select a proposal, where a quorum is a sufficiently large number of devices such that any other quorum has, as a majority of its devices, non-malicious devices from the first quorum. Therefore, the distributed computing system can operate properly with M number of malicious failures and F number of total failures, and with a minimum of message delays, if the number of constituent devices in the distributed computing system is greater than 3F+2M. Additionally, if the distributed computing system can revert to a more traditional algorithm if too many devices fail or become malicious, it can use a message-delay-reducing algorithm while having as few as 2Q+F+2M+1 constituent devices, where Q is the number of devices that can fail and still allow the system to use a message-delay-reducing algorithm.
Owner:MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products