Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

61results about How to "Small memory" patented technology

Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer

Methods for generating a virtual recursive secure container and for generating a virtual secure container of relationship of rights along with a system that distributes copyrighted digital content, respecting the legal framework for intellectual property when distributed electronically, either on the Internet or any other digital medium, and offering consumers their rights as buyers of digital content.The digital content can be of various natures, such as an electronic book, a digital video file, a digital music file, a computer application, a computer program or any digital work requiring an electronic device to be run or enjoyed, e.g. personal computer or laptop, mp3 or mp4 players, video players, mobile phones, tablets, electronic book readers, and other specialized devices.The following scenarios for digital content distribution to the user's digital device are allowed by the invention: Firsthand, secondhand (resale), rental, exchange, and temporary or permanent transfer (gift). Secondhand, exchange and transfer scenarios are only possible if the user has purchased the digital content in one of the following scenarios: Firsthand, secondhand, exchange, or transfer.The logical components of the invention, ‘Master Avatar ’ and ‘User Avatar’, which reside in the users' digital devices, create the virtual framework for relating rights of author and consumer, where the Master Avatar prevents author's rights from being violated, and the User Avatar maintains consumer's rights when purchasing digital content. By providing each avatar with a key to decrypt the data of digital content distributed through the system, the virtual link for relating the rights of author and consumer is created.The method for generating a virtual recursive secure container, that provides virtual links for relating a digital file, in combination with the distribution in a unique way of at least one of the encryption keys to a set of avatars, produces a virtual recursive secure container of relationship of rights.The invention only distributes digital content in a virtual secure container of relationship of rights of author and consumer if either the author or a licensed medium previously published that content in the system and authorized its distribution in the scenarios allowed by the system.
Owner:CARRILLO DE LA FUENTE MIGUEL ANGEL

Group key management approach based on linear geometry

A group key management approach based on linear geometry is disclosed. The approach includes the following steps: step 1: a group controller selects a mapping f and a finite field F; each group member selects a m-dimensional private vector over the finite field F, and sends it to the group controller via secure channel; step 2: the group controller selects a mapping parameter in the finite field F randomly, and maps the private vectors of all the group members into a new set of vectors by using the mapping f according to the mapping parameter; step 3: the group controller selects a random number k in the finite field F as a group key, and constructs a system of linear equations by using the new set of vectors and the group key; the group controller computes the central vector, and sends the central vector and the mapping parameter to all the group members via open channel; step 4: after the group members receive the central vector and the mapping parameter, the private vector of each group member is mapped to a new vector in a vector space according to the mapping parameter, and the group key is obtained by calculating the inner product of the new vector and the central vector. This invention requires small memory and little computation, has high security property, and is effective against brute-force attacks.
Owner:SOUTH CHINA UNIV OF TECH

System and Method for Establishing Reliable Communication in a Connection-Less Environment

InactiveUS20120072520A1Large communication overheadComplete communication flowMultiple digital computer combinationsTransmissionTimerDistributed computing
The establishment of reliable communication, in particular in an environment of the mobile industry processor interface where communication is taking place based on the Unified Protocol is described. In this case based on the timer at the sender and based on maintaining an originator of a message at the receiver certain precautions are taken that messages are exchanged correctly and only once an acknowledgement is received from the sender, that a first and a second message have been exchanged correctly a maintained originator at the receiver is released. The same method can also be applied to sending a plurality of messages in sequence by using sequence numbers and replying to them in the same manner. In this case the timer is always restarted, once the message as a first type of message is sent from the sender side and an acknowledgement is sent after the last second type of message with a highest sequence number has been received from the receiver side. With the method and the system according to the present invention it is possible to implement the configuration protocol of the Unified Protocol even in a case where a connection-less service which is faster to use is selected. The method according to the present invention may be triggered by a bit that is set in a protocol data unit as one of the reserved bits in the header there.
Owner:ST ERICSSON SA

Statement enquiring system and method capable of controlling display interface

The invention provides a system and a method capable of controlling a display interface to inquire reports. The system comprises a plurality of query computers connected with a service computer through a communication network, wherein the service computer comprises a memory storing a report database and a graphic interface control program, a processing module and a data standardizing module; each query computer comprises a query interface, a download operation module, an integrating module and a display interface. The method comprises the following steps: inputting a query condition from the query interface; analyzing the query condition by the processing module to obtain header information; calling the graphic interface control program including the header information by the processing module and downloading the graphic interface control program by the download operation module to operate and obtain a figure line file; calling the report database by the processing module and outputting a first data corresponding to the header to the data standardizing module; converting the first data into a second data by the data standardizing module; and integrating the figure line file and the second data into an interface file by the integrating module and outputting the interface file to the display interface for operation and display.
Owner:HUANDA COMPUTER (SHANGHAI) CO LTD

Group key management approach based on linear geometry

A group key management approach based on linear geometry is disclosed. The approach includes the following steps: step 1: a group controller selects a mapping f and a finite field F; each group member selects a m-dimensional private vector over the finite field F, and sends it to the group controller via secure channel; step 2: the group controller selects a mapping parameter in the finite field F randomly, and maps the private vectors of all the group members into a new set of vectors by using the mapping f according to the mapping parameter; step 3: the group controller selects a random number k in the finite field F as a group key, and constructs a system of linear equations by using the new set of vectors and the group key; the group controller computes the central vector, and sends the central vector and the mapping parameter to all the group members via open channel; step 4: after the group members receive the central vector and the mapping parameter, the private vector of each group member is mapped to a new vector in a vector space according to the mapping parameter, and the group key is obtained by calculating the inner product of the new vector and the central vector. This invention requires small memory and little computation, has high security property, and is effective against brute-force attacks.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products