Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

537results about How to "Opportunities decrease" patented technology

Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data

A computer system (20) having a security domain (22), at least one client business domain (26), and a plurality of client terminals (34) utilizes a hidden link dynamic key manager (24, 84) and a database structure that includes encrypted data entities (30C, 30D) and a security identification attribute (32) for storage of encrypted data. Methods for encrypting data and for storing, decrypting, and retrieving encrypted data operate on the computer system (20), which also includes an information database (62) and a key database (44). The key database (44) is isolated from the information database (62). The hidden link key manager is stored in the security domain (22) and includes a system key manager (84) operable to generate system keys with system key common names and an encryption key manager (24) operable to generate encryption keys having encryption key identifications. The key managers (24, 84) operate on a key server (40), which is mirrored by a secondary key server (42). A general security manager (82) also operates on the key server (40) to control access to the security domain (22). The security information attribute (32) is stored with a persistent data entity (30A) that is associated with the other encrypted data entities (30C, 30D) by a database schema. The encryption key identification (112) for the encryption key used to encrypt the data entities (30C, 30D) is encrypted by a system key and then stored as part of the security information attribute (32). The system key common name hash value (114) is also stored in the security information attribute (32). The information data entities (30) are stored on the information database (62), but the encryption key identification (153), encryption key (154), system key common name hash value (156, 157), and system key common name (158) are stored in the key database (44) inside the security domain (22). The system key itself is stored on a Smart Card reader (56) inside the security domain.
Owner:FARRUKH ABDALLAH DR +1

System and method for authenticated and privacy preserving biometric identification systems

A system and method for the identification of users and objects using biometric techniques is disclosed. This invention describes a biometric based identification and authorization systems which do not require the incorporation of an on-line database of stored complete biometrics for the security infrastructure. In order to remove the connectivity requirements, an off-line biometric system is achieved by incorporating an identity verification template (IVT) on a storage device/token (e.g., magnetic strip or smart-card) during the user's registration which provides for a reliable storage medium; however, there are no security requirements required of the token even to protect the privacy of the stored biometric. The IVT does not contain complete information of the user's biometric but allows for the verification of the user when that user later provides a biometric reading. To deal with errors that may be introduced into later scans of the biometric (for example at the time of verification) error correcting techniques, well known in the art of communication and error control systems, are incorporated into the system. The system is also usable in the online model. Moreover, it may also be used to enable cryptographic operations by being used to partially compose or encrypt private keys for cryptographic operation.
Owner:GIDIPO LLC

Harvesting hydrocarbons and water from methane hydrate deposits and shale seams

A method of extraction of fuels, organic pollutants, and elements from Methane hydrate deposits, shale seams and the soil is described which freezes the zone and heats the center carrying the fuel, chemicals and water in these deposits and seams from where they are found, be it deep in the sea or on land, and carries them into the condensing unit in inert Nitrogen gas. Required drilling on the surface or sea bottom includes a main shaft and with auxiliary narrow drillings widely spaced from the shaft. The extraction zone, which is first cooled to brittle cold using the evaporation of Liquid Nitrogen and fractured with vibrations, is heated to the highest temperature of the hydrocarbon fraction desired to be extracted. The evaporating hydrocarbons are extracted in a Nitrogen gas carrier, a recognized fire suppressant (NFPA Code 2000). To speed the extraction rate, tonal input from two or more sounding units vibrates the seam structure freeing the evaporated hydrocarbons allowing more rapid escape into the shaft. To prevent air loss in aquifers, ice barriers seal the zone periphery. These hydrocarbons are separated into the hydrocarbons fractions, into fuel fractions as heating oil, kerosene, gasoline, ethers, and fuel gas including methane, Argon / Oxygen and rare gas segments, or, if pollutants, into the separate chemicals by boiling point. The thermal gradient of the extraction pipe is implemented by sourcing the Nitrogen from Liquid Nitrogen and bundling those pipes with the extraction pipe condensing its contents by hydrocarbon fractions into vessels and gas drums depending on boiling points of fractions. Water is separated from the gasoline segment and purified first by separation and then by freezing. The extraction of deep deposits layer the extraction zones as well as work neighboring extraction zones covering many acres. Fuel gases can be liquefied or burned in an on-site electric generating plant.
Owner:AIR WARS DEFENSE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products