Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

144results about How to "Little information" patented technology

Electric vehicle intelligent queuing method capable of improving charging efficiency

The invention provides an electric vehicle intelligent queuing method capable of improving charging efficiency. The method is characterized by comprising the following steps that firstly, an electric vehicle driver is in connection with an intelligent charging network and a vehicle-mounted computer of an electric vehicle through an intelligent terminal; secondly, the intelligent terminal receives electric vehicle information transmitted by the vehicle-mounted computer in real time, wherein the electric vehicle information comprises electric vehicle serial numbers, residual electricity quantity, driving mileage and charging early-warning signals; thirdly, after the intelligent terminal receives the charging early-warning signals, the intelligent terminal is in communication with the intelligent charging network server and issues a charging request to the intelligent charging network server, ..., and eleventh, the turned electric vehicle is connected with an intelligent charging pile to be charged. According to the method, through a smart phone, the charging pile can be looked for, and through the residual electricity quantity of the electric vehicle, waiting time and predicated charging time required by charging several closest charging piles can be accurately predicated, the queuing efficiency is improved, and the queuing time is shortened.
Owner:BEIJING FLASH CHARGE NETWORK TECH CO LTD

Device and method with reduced information leakage

The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information. It is also directed to a method of processing such a data-processing system with an operating system, comprising a writing step for writing first unencrypted information into the first persistent memory, an encryption step for encrypting the first unencrypted information under use of the first cryptographic key, creating therefrom first encrypted information in the first persistent memory, and an access-limitation step for setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system. It also relates to a method of executing an operation on such a data-processing system comprising a decryption step for decrypting the first encrypted information under use of the first cryptographic key, thereby generating therefrom first unencrypted information and an execution step for executing an operation by the processor, using the first unencrypted information.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products