Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

268results about How to "Exposure was also limited" patented technology

"V-chip" preset criteria

Systems, methods and apparatus are provided for allowing a user to supervise personal exposure to a program exhibited by a consumer electronics device, such as a television system. The consumer electronics device includes “V-chip” circuitry that analyzes a signal and either blocks or passes the signal based on certain content-based criteria. In this connection, a user can program the “V-chip” circuitry with the preset content-based criteria in the form of preset content-based specification sets, which are stored in the consumer electronics device by the manufacturer. The preset content-based specification sets specify either allowable or objectionable content within a program signal received by the consumer electronics device. The “V-chip” circuitry receives a content-based indicator set, which is indicative of the actual content of the program signal. One of the preset content-based specification sets is conveniently selected by a user. The “V-chip” circuitry then compares the content-based indicator set with the selected preset content-based specification set when the program signal is received by the consumer electronics device. Based on this comparison, the “V-chip” circuitry either passes the signal to an output device for transformation of the signal into the program, or blocks the signal from being sent to the output device.
Owner:MITSUBISHI ELECTRIC US

System and method for a business payment connection

An online business payment method that provides credit and cash flow management for at least one seller of products or services, at least one buyer of the products or services, and a financial institution via a business payment system accessible via a network connection. The method includes first establishing a credit line for the buyer by the financial institution. Next, placing a purchase order for a product or service by the buyer to the seller and entering a purchase order number into the business payment system. Next, accepting the purchase order by the seller and providing the product or service to the buyer. Next, sending an invoice by the seller to the buyer and entering the invoice into the business payment system against the purchase order number. Next, approving the invoice by the buyer, entering the approval into the business payment system and notifying the financial institution of the approved invoice by the business payment system. Finally, approving payment of the approved invoice by the financial institution and paying the invoice by transferring money from the buyer's credit line to an account of the seller. The seller sets a payment term for the invoice and pays a seller's fee to the financial institution upon receipt of the invoice payment. The seller's fee depends upon the invoice payment term. The buyer pays interest to the financial institution when the invoice payment term is not met. Access to the online business payment system is secure and selective access permissions are defined for each member.
Owner:ADRIAN ALEXANDRA J

Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces

ActiveUS20150121506A1Exposure be also limitedWithout the risk of the receiving device compromising the security of the sending systemDigital data processing detailsUnauthorized memory use protectionData transmissionSafe system
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its operating posture by allowing, limiting, or disallowing access to applications, application features, devices features, data, and other information based on the current Tailored Trustworthy Space (TTS) definitions and rules which provided for various situationally dependent scenarios. Multiple TTS may be defined for a given deployment, each of which specifies one or more sensors and algorithms for combining sensor data from the device, other connected devices, and/or other data sources from which the current TTS is identified. The device further achieves security by loading digital credentials through a unidirectional multidimensional physical representation process which allows for the device to obtain said credentials without the risk of compromising the credential issuing system through the data transfer process. This secure system methodology may be used to create a Mobile Secure Compartmentalized Information Facility (M-SCIF), among other applications.
Owner:INTERNET INFRASTRUCTURE SERVICES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products