Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

693 results about "Alphanumeric" patented technology

Alphanumericals are a combination of alphabetical and numerical characters, and is used to describe the collection of Latin letters and Arabic digits or a text constructed from this collection. Merriam-Webster suggests that the term "alphanumeric" may often additionally refer to other symbols, such as punctuation and mathematical symbols.

IC card file system

File system for IC CARD comprising an integrated circuit IC, non volatile memories ROM and/or E2PROM and at least a volatile memory RAM, for organizing files storage inside the non volatile memories and defining, through a logical structure, their accessibility by an IC Card application, stored inside one of said non volatile memories or IC or loaded in the volatile memory and in communication with an external read-write device; an interchange application, stored inside one of said non volatile memories, drives the organization of files in an additional tag-length logic structures of arbitrary length, allowing the identification of files through alphanumeric identifiers of arbitrary length and extension, and their accessibility by an external read-write device, eventually non IC card purpose, like a workstation a personal computer or a PDA interconnected to the IC Card by means of standard communication interface. The file system organizes said tag-length logic structure as individually memory blocks, each identified by an hexadecimal identification number and a block size and one of these memory blocks, more particularly one per non volatile memory, describes the content of the non volatile memory, comprising the number of files stored, their file name and extension and, for each file, the location of memory blocks composing its content.
Owner:STMICROELECTRONICS INT NV

Utility monitoring device, system and method

A monitoring device, system and method is provided for in-home/on-premises monitoring of usage of utilities, such as electricity and other services. The monitoring device receives information from a smart metering system or transceiver, and displays current usage through an illuminated display, which displays a colour indicative of the current cost of consumption, and controls illumination of the display to scan illumination across the display at a traverse rate indicative of a rate of consumption or other metric, the scanning of a pattern of illumination across the display simulating movement or rotation in the display. The display therefore provides a consumer with immediate “at a glance” visual information on current usage. Optionally a digital display screen provides more detailed alphanumeric and graphical information, through a number of selectable display modes. Beneficially one or more devices may be networked, and interface directly or indirectly with a transceiver of a smart metering system, or a retrofit transceiver for a conventional meter. While particularly suited to electricity monitoring, monitoring of other utilities and services may alternatively or additionally be provided. The system may be used with a wired network or wirelessly networked by one of a number of standard wireless and mesh network communication protocols.
Owner:AZTECH ASSOC INC

System and method for verification of identity

A system for verifying identities comprising an enrollment system having: (i) at least one alphanumeric input device; (ii) at least one biometric input device; (iii) at least one header file database having a plurality of identities; (iv) at least one search engine, said search engine in communication with said header file database such that said search engine first receives an alphanumeric data signal which has been input into said alphanumeric input device by the user, and then searches said database for identities that match the alphanumeric data according to a predetermined first set of criteria; (v) a processor to score the set of identities matched by said search engine according to a predetermined second set of criteria, said processor capable of determining the acceptability or unacceptability of said user's input alphanumeric data based on said score; and (vi) an identity escrow database which is in communication with said processor and receives from said unit an approved identity data signal based on the acceptability of the score, said escrow database additionally in communication with said biometric input device capable of receiving at least one biometric identity data signal input by the user to said biometric input device, said escrow database further comprising means for coupling the approved identity data signal and the biometric identity data signal to create at least one subfile within the escrow database for each user comprising the approved identity data signal and the biometric data signal. The present invention further comprises a verification system for verifying the identity of said user after the user has enrolled in the enrollment system. The verification system has means for processing a second input biometric data signal input by the user to the biometric input device to match the user's preexisting biometric data in said escrow database according to a predetermined third set of criteria. The verification system has an output device for transmitting to a third party whether or not a match was located within said escrow database for said user. The present invention further relates to a method and system for providing a warranty against the theft of a user's identity.
Owner:ELLINGSON JOHN F

Portable security transaction protocol

A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc. In general, the first data item will be a short alphanumeric string and the second data item will generally be much larger, e.g., a 128 bit sequence to be used principally for data authentication. According to another aspect of the present invention, consequential evidence of the transaction may be secured to provide after-the-fact evidence of the transaction. This evidence can include a message written to a tamper-resistant log record, the message including the transaction information, the first data item, the second item, and an identifier for the originating user, as well as other information. At a subsequent point, the transaction can be shown to have been sent by the originating user and received by the intended recipient, by consulting the log record. Preferably, the validity of the transaction would be ascertained by an independent, mutually trusted third party.
Owner:JPMORGAN CHASE BANK NA

Portable security transaction protocol

A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the transaction information using only a second data item, wherein the entropy of the first data item is less than the entropy of the second data item, and authenticating the originating user using the first data item. The first data item can be a sequence of digits corresponding to those displayed on an external device, such as, for example, an RSA authorization token, credit card, etc. In general, the first data item will be a short alphanumeric string and the second data item will generally be much larger, e.g., a 128 bit sequence to be used principally for data authentication. According to another aspect of the present invention, consequential evidence of the transaction may be secured to provide after-the-fact evidence of the transaction. This evidence can include a message written to a tamper-resistant log record, the message including the transaction information, the first data item, the second item, and an identifier for the originating user, as well as other information. At a subsequent point, the transaction can be shown to have been sent by the originating user and received by the intended recipient, by consulting the log record. Preferably, the validity of the transaction would be ascertained by an independent, mutually trusted third party.
Owner:JPMORGAN CHASE BANK NA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products