Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

15140results about How to "Operational security" patented technology

Microprocessor controlled ambulatory medical apparatus with hand held communication device

An implantable infusion pump possesses operational functionality that is, at least in part, controlled by software operating in two processor ICs which are configured to perform some different and some duplicate functions. The pump exchanges messages with an external device via telemetry. Each processor controls a different part of the drug infusion mechanism such that both processors must agree on the appropriateness of drug delivery for infusion to occur. Delivery accumulators are incremented and decremented with delivery requests and with deliveries made. When accumulated amounts reach or exceed, quantized deliverable amounts, infusion is made to occur. The accumulators are capable of being incremented by two or more independent types of delivery requests. Operational modes of the infusion device are changed automatically in view of various system errors that are trapped, various system alarm conditions that are detected, and when excess periods of time lapse between pump and external device interactions.
Owner:MEDTRONIC MIMIMED INC

Secure yet flexible system architecture for secure devices with flash mass storage memory

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and therefore potentially vulnerable to hacking. An indication of the authenticity of the firmware must be present before it will be executed by the device. This protects the device contents from unauthorized duplication or tampering. Additional functionality can be added to the device with additional firmware applications, and the authenticity of those additional applications will also be verified before they will be executed. This further prevents unauthorized copying or tampering of secure content through any mechanisms that may be unscrupulously introduced. Any data within the mass storage memory may also be encrypted.
Owner:SANDISK TECH LLC +1

Lithium metal dispersion in electrodes

Electrodes, such as anodes and cathodes, can include a host material that is prelithiated or undergoes lithiation upon electrolyte introduction into a battery. Lithiation of the host material can occur by the agitation of lithium metal and a host material, the agitation of a lithium metal powder and a host material at a temperature greater than room temperature, the application of pressure to a lithium metal and host material mixture, contact of the host material with molten lithium metal, the lamination of lithium foil or lithium mesh onto an electrode containing the host material, or by lamination of lithium metal or mesh onto an electrode at elevated temperatures.
Owner:AEA TECH BATTERY SYST +1

Vehicle-based headway distance training system

A vehicle-based headway collision avoidance training system (300) is provided that includes a sensor system (350) mounted to the training vehicle (200), a processing system (330), and an interface unit (340) coupled to the vehicle's wiring. The combination of processing system (330), a graphical display (332), a data input device (334), and an audio output device (336) provides a collection of special auditory and visual displays attended to by the student, and controls and displays used by the instructor that are unique for teaching headway safety in the context of a moving vehicle.
Owner:RAU PAUL S

Systems and methods for control of an unmanned ground vehicle

Systems and methods for interruptible autonomous control of a vehicle. Autonomous control is achieved by using actuators that interact with input devices in the vehicle. The actuators (e.g., linkages) manipulate the input devices (e.g., articulation controls and drive controls, such as a throttle, brake, tie rods, steering gear, throttle lever, or accelerator) to direct the operation of the vehicle. Although operating autonomously, manual operation of the vehicle is possible following the detection of events that suggest manual control is desired. Subsequent autonomous control may be permitted, permitted after a prescribed delay, or prevented.
Owner:IROBOT CORP

Economical High Pressure Wear Resistant Cylinder That Utilizes A High Pressure Field For Strength

A high-pressure wear resistant cylinder that utilizes a high-pressure field for strength is an economical method of, or device for, handling very high pressures and the pumping of abrasive and corrosive fluids. The economic considerations are so favorable, that the invention may be considered a replacement part. The invention is suitable for a variety of applications, particularly a reciprocating flow work exchanger in the well stimulation or hydraulic fracturing industry. Using a high pressure field to strengthen the external surface (outside) of a pipe that is precision honed and plated or sleeved internally (inside), it is now possible to construct various high pressure machines in a relatively inexpensive manner. This invention makes it possible to use pipe with internal operating pressures greater than their nominal operating pressure ratings permit. This invention will be used in various high pressure piping and machinery applications.
Owner:TRINITY PUMPWORKS LLC

Authentication method and device

[PROBLEM] Person authentication and authentication device of the present invention aims at providing a user with services of easy, inexpensive, highly secure, and reliable person authentication. [MEANS TO SOLVE THE PROBLEMS]Authentication method adopted by the present invention comprises: a step that forwards to a communication device of a user a registration identifier that identifies the user and / or the communication device by including the identifier in an address of registration screen peculiar to the user and / or the communication device; and a step that, when the address is accessed, and a first password is entered and replied to the registration screen, authenticates the user based on the registration identifier and the first password; and a step that sends a login screen display to the user when the authentication step is successful, which the step is comprised of a step where the login screen display comprises a field for entering a second password, and a login identifier to identify the user and / or the communication device; and a step that authenticates the user based on the login identifier contained in the login screen display replied by the user, and the second password.
Owner:MORGAN STANLEY

Methods used in a secure yet flexible system architecture for secure devices with flash mass storage memory

A device with mass storage capability that uses a readily available non secure memory for the mass storage but has firmware (and hardware) that provides security against unauthorized copying of data. This is true even though the firmware itself is stored in the non secure mass storage memory, and therefore potentially vulnerable to hacking. An indication of the authenticity of the firmware must be present before it will be executed by the device. This protects the device contents from unauthorized duplication or tampering. Additional functionality can be added to the device with additional firmware applications, and the authenticity of those additional applications will also be verified before they will be executed. This further prevents unauthorized copying or tampering of secure content through any mechanisms that may be unscrupulously introduced. Any data within the mass storage memory may also be encrypted.
Owner:SANDISK TECH LLC +1

System and method for control of quadrotor air vehicles with tiltable rotors

A system and method of controlling quadrotor air vehicles (QRAV) that may include an additional two degrees of freedom for each of the four propellers of the QRAV. Each of the four rotors may be allowed to rotate (tilt) around two local axes selected from the x-axis (roll), y-axis (pitch), and z-axis (yaw). Control of the quadrotor including the additional two degrees of freedom allows thrust of each rotor to be direct in any direction of a semi-sphere. As a result, total control inputs of the QRAV may be increased to twelve, enabling smooth control to achieve superior and precise maneuverability. Additionally, the system and method is fault tolerant and capable of handling failures of any of the rotors. Commands to the propellers may be fully decoupled and achieved independently thereby giving pilots better control to execute difficult maneuvers.
Owner:KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products