Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

5314results about How to "Increase the difficulty" patented technology

Method for dynamically adjusting an interactive application such as a videogame based on continuing assessments of user capability

A method of balancing a user's input to an interactive computer program with the program's output is obtained by continually measuring the difference between the user's input and the program's output and adjusting one or more parameters of the program's output so that the difference from the user's performance is progressively reduced. The adjustment may be obtained dynamically through negative feedback dampening of the measured difference (delta) between user input and program output, and/or by selection of predetermined apposite values for program output corresponding to the measurement of user input. The adjustment results in dynamic generation and/or selection of premodeled segments of interactive output in closer balance with user input. The adjustment method can be applied to video games, educational games, productivity programs, training programs, biofeedback programs, entertainment programs, and other interactive programs. In video games, the adjustment method results in balancing user performance with game difficulty for a more engaging game experience. It can also enable embedded advertising to be triggered when the user is in an optimum state of engagement. The adjustment method may be performed by projecting future trends of user performance, selecting predetermined or dynamically determined levels of value, modifying user control of input devices, or even modifying the program's challenges to user capability over time.
Owner:CONKWRIGHT GEORGE COLBY

Method and system for enhancing the security of a transaction

ActiveUS20190012672A1Increasingly difficultHard to removeDigital data protectionDigital data authenticationIntegrated circuitComputer security
This invention concerns a method and system for improving the security of transaction in an emulated Integrated Circuit. During compilation time of a payment application, at least one detection agent are inserted into the code of the payment application. This detection agent is configured to detect an unauthorized use of the payment application. During a runtime of the payment application, if the detection agent result indicates “no threat detected” the payment application retrieves from a predefined map of “no threat detected”, the right value associated to the detection agent, otherwise a random false value is generated. The payment application alters at least one data manipulated during the transaction with the value retrieved or generated. A reverse mechanism of the payment application retrieve the right value and apply a restoration process to the altered data with the retrieved right value. The payment application computes a cryptogram from the restored manipulated data. From the computed cryptogram, a third party can authorize or reject the transaction.
Owner:THALES DIS FRANCE SA

Cognitive training using visual stimuli

A computer-implemented method for enhancing cognition, e.g., for improving cognitive ability of a participant using visual stimuli. A set (or sets) of visual stimuli is provided for visual presentation to the participant. A visual stimulus from the set is visually presented to the participant. The participant is required to respond to the visual stimulus. A determination is made regarding whether the participant responded correctly. The stimulus intensity of the visual stimuli presented may be adjusted based on the correctness / incorrectness of the participant's response according to a single-stair maximum likelihood (e.g., ZEST) or N-up / M-down procedure. The visually presenting, requiring, and determining are repeated one or more times in an iterative manner to improve the participant's cognition, e.g., ability to process visual information, memory, etc. Assessments may be performed during the repeating according to a dual-stair maximum likelihood (e.g., ZEST) or N-up / M-down procedure. The repeating may include performing multiple exercises using visual stimuli.
Owner:POSIT SCI CORP

Methods And Apparatus For HyperSecure Last Mile Communication

ActiveUS20180359811A1Simplified challengeSacrificing network latencyNetwork traffic/resource managementNetwork topologiesData fileClient-side
A variety of techniques for concealing the content of a communication between a client device, such as a cell phone or laptop, and a network or cloud of media nodes are disclosed. Among the techniques are routing data packets in the communication to different gateway nodes in the cloud, sending the packets over different physical media, such as an Ethernet cable or WiFi channel, and disguising the packets by giving them different source addressees. Also disclosed are a technique for muting certain participants in a conference call and a highly secure method of storing data files.
Owner:LISTAT LTD

Large-scale distributed network safety data acquisition method and system

InactiveCN103731298AAvoid lossMeet the needs of comprehensive collectionData switching networksData streamOriginal data
The invention relates to a large-scale distributed network safety data acquisition method and system. The method comprises the steps of multimode data acquisition, data analysis and standardization and data distribution and transmission. The system comprises an acquisition agent module, a data acquisition module, a data analysis module and a data distribution and transmission module. With respect to data acquisition, multiple modes such as an active mode, a passive mode and a data stream mirror image mode are adopted, and comprehensive acquisition of various types of data is realized; with respect to data analysis, a data analysis and standardization mechanism based on strategies is adopted, original data are extracted, mapped, replaced, supplemented and the like by means of writing analysis strategies, and therefore quick analysis of a newly added data format and data standardization oriented to multiple application systems are realized; with respect to transmission, the multi-stage connection technology and the multi-path distribution technology are adopted, elastic combination, cascading deployment and multi-path distribution between acquisition systems are realized, and the requirements for vertical and horizontal expansion of a network environment and acquisition of mass data information are met.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND +1

Lightweight back-up and efficient restoration method of health block chain data encryption keys

The invention provides a lightweight back-up and efficient restoration method of health block chain data encryption keys.Body area networks achieve physiological parameters acquisition of healthy body health, health block chains are produced by a group of credible IT devices appointed by multiple health institutions and used for receiving and storing health data of the body area networks, the health block chain data encryption keys are produced by utilizing a fuzzy technology fuzzy vault and physiological signals acquired by the body area networks, human physiological data acquired in different time periods is encrypted by utilizing different data encryption keys and then is saved in the block chains of the IT devices without storage of historical data encryption keys; historical secret keys are restored by utilizing the health data acquired by the body area networks in real time.The lightweight back-up and efficient restoration method integrates the body area networks with the health block chains, avoids huge burden brought by secret key splitting related in a traditional secret key restoration method and safe storage and retrieval of shadow secret keys and greatly reduces management complexity of the health block chain data encryption keys.
Owner:QILU UNIV OF TECH

Authentication techniques in a monitoring system

An Electronic House Arrest Monitoring (EHAM) system of the present invention includes a transmitter attached to a monitored offender and a receiver positioned in the vicinity of the desired monitoring location. The transmitter and the receiver each have a pattern stored or generated therein for determining the interval of time between signal transmissions and receptions. The pattern is pseudo-random to offer improved protection against imposter transmitters, in other words the time intervals are selected to be unequal and randomly varying but the pattern is repeated or cycled to allow continuing signal transmission by the transmitter. The transmitter transmits signals at varying time intervals according to this pattern, and the receiver authenticates signals it receives as coming from the monitored transmitter based on the expected time intervals from the pattern. The pattern may include any number of time intervals and, in one embodiment, includes more than one subpattern to extend the length of the repeat cycle to increase the difficulty of defeating the monitoring system. As further protection against imposter devices, the receiver may verify the signals based on information unique to the transmitter included in each signal. The receiver may further use the received signals and unique time interval patterns to determine a number of operating states, including New Transmitter ID Received, Transmitter In Range and Locked to Transmitter, Transmitter In Range and Not Locked, Transmitter Out of Range, and Imposter Likely. The monitoring system may also include a remote host computer linked to the receiver or receivers to enable these operating states to be monitored remotely by enforcement personnel.
Owner:BI

Online voiceprint recognition system and implementation method thereof

InactiveCN102543084APrevent recording attack problemImprove accuracySpeech analysisTransmissionPasswordAuthentication server
The invention discloses an online voiceprint recognition system and an implementation method thereof. The online voiceprint recognition system comprises a user recording module and an online voiceprint recognition server, and the implementation method comprises the following steps of: (1) providing generated password content for a user through the online voiceprint recognition server; (2) recording the voice of the user by utilizing the user recording module and providing the voice for a voice recognition module; (3) performing mode matching analysis on voice content provided by the user and the password content through the voice recognition module; (4) judging whether an audio fingerprint of the voice provided by the user is of the legal voice or not through an audio fingerprint recognition module; and (5) inspecting the matching degree between the voice provided by the user and a voiceprint module established by the registered user through a voiceprint recognition module, and regarding login is the real user login and receiving the login of the user if the degree achieves a set value. According to the online voiceprint recognition system and the implementation method thereof, disclosed by the invention, simple, easy-to-use and high-efficient online identity authentication can be realized.
Owner:SHENGLE INFORMATION TECH SHANGHAI

Bump array device having asymmetric gaps for segregation of particles

The disclosure relates to obstacle array devices (also known as bump array devices) for separating populations of particles by size. Improvements over previous obstacle array devices are realized by causing the fluid velocity profile across gaps between obstacles to be asymmetrical with respect to the plane that bisects the gap and is parallel to the direction of bulk fluid flow. Such asymmetry can be achieved by selecting the shape(s) of the obstacles bounding the gap such that the portions of the obstacles upstream from, downstream from, or bridging the narrowest portion of the gap are asymmetrical with respect to that plane. Improvements are also realized by using obstacles that have sharp edges bounding the gaps. Other improvements are realized by selecting obstacle shapes such that the critical particle dimensions defined by the gaps in two different fluid flow directions differ.
Owner:THE TRUSTEES FOR PRINCETON UNIV

Graphical Image Authentication And Security System

A method and system for protection of and secure access to a computer system or computer network from a portable device. The method includes the steps of receiving a first login account identifier, such as a user name from a user in communication with the computer system or network. A determination is made if the user is recognized and enrolled from the first login account identifier. If the user is recognized, a series of randomly generated visual images is displayed including one visual image from an image category which has been pre-selected by the user upon enrollment. An image category identifier is randomly assigned to each visual image in the series. An image category identifier is entered and received. If the login account identifier and the image category are validated, access is permitted to the computer system or network from the portable device.
Owner:DEFENDERS OF THE AMERICAN DREAM LLC

Flexible Intramedullary Nail

A flexible intramedullary nail is disclosed that is manufactured from a biocompatible rigid material and having a substantially cylindrical hollow body, a leading segment with an entry hole at a distal end and at least one securing means and a trailing segment having a trailing edge and an attachment mechanism. The body has at least one flexible center section, each having at least one slot to provide flexibility. In one embodiment the at least one slot follows a sinuous, serpentine path to form a plurality of interlocking teeth that can follow a helical or a concentric path. Each of the slots has a proximal end and a distal end, with the proximal end being spaced from the trailing segment and the distal end being spaced from the leading segment. When multiple slots are incorporated, the proximal end of a slot is spaced from a distal end of a subsequent slot. The first of the at least one flexible center section and a second of the at least one flexible center section can be separated by a non-slotted section. The nail can be used with a flexible insertion shaft or a locking shaft.
Owner:FLEX TECH

High-purity fishy smell and foreign odor-free fish collagen protein peptide and preparation method thereof

The invention discloses a high-purity fishy smell and foreign odor-free fish collagen protein peptide and a preparation method thereof. The preparation method comprises the following steps: cleaning fish skins, and then cutting into blocks and mincing; performing stirring treatment with NaCl solution; centrifugally degreasing to remove paraprotein; adding water to regulate the pH value of initial slurry to be 8.0-8.5; performing combined gradient enzymolysis on alkali protease and neutral protease; deactivating enzyme after the enzymolysis is ended; performing adsorption bleaching by activated carbon; and then performing rough filtration, fine filtration, evaporation concentration and spray drying to prepare the high-purity fishy smell and foreign odor-free fish collagen protein peptide. The high-purity fishy smell and foreign odor-free fish collagen protein peptide disclosed by the invention has a simple process and is easy to industrial production; fishy smell, foreign odor and non-collagen proteins are fully removed in production; the low-temperature biological enzymolysis technology is adopted, and other substances are not added, thereby, the product quality is improved; an obtained fish collagen protein peptide powder has the characteristics the content of amino acid hydroxyproline is not less than 9 percent, and the average molecular weight is lower than 1000Dal; no fishy smell or foreign odor cannot generated, and obvious fishy smell or foreign odor also cannot be generated through heating treatment under the acid conditions. The high-purity fishy smell and foreign odor-free fish collagen protein peptide can be widely applied to processing of various foods and cosmetics as a green functional ingredient.
Owner:广州合诚实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products