Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

67 results about "DECIPHER" patented technology

DECIPHER is a web-based resource and database of genomic variation data from analysis of patient DNA. It documents submicroscopic chromosome abnormalities (microdeletions and duplications) and pathogenic sequence variants (single nucleotide variants - SNVs, Insertions, Deletions, InDels), from over 25000 patients and maps them to the human genome using Ensembl or UCSC Genome Browser. In addition it catalogues the clinical characteristics from each patient and maintains a database of microdeletion/duplication syndromes, together with links to relevant scientific reports and support groups.

Method of detecting, comparing, blocking, and eliminating spam emails

A method of detecting, comparing, blocking, and eliminating spam emails sent through email servers of Internet service providers (ISPs) or to email users' email-boxes. The method includes the steps of generating a spam decipher signature for each email in an ISP's mail server or a user's email-box, comparing newly generated spam decipher signatures to a server or user database containing spam decipher signatures of known spam emails to detect spam emails when there is a probability match at a pre-determined high percentage, and preventing the spam emails from going through the ISP's mail server or to the email user as non-spam emails. The method also includes the steps of updating a master spam decipher signature database by comparing spam decipher signatures in a new signature database with existing spam decipher signatures in the master database, incrementing a counter value of a matching spam decipher signature by the number of matches, and adding all new spam decipher signatures that have counter values reaching or exceeding a pre-set threshold and therefore are considered spam to the master spam decipher signature database. The method further includes the steps of initially loading the master spam decipher signature database to the ISP email server or the user's computer to establish the server or user database, and updating the server or user database with the master spam decipher signature database.
Owner:PARK SHAWN

Two-dimensional code based clothing industry client information management method

The invention discloses a two-dimensional code based clothing industry client information management method. The card number information, the identity information and the body type information of a client are encrypted so as to code the encrypted information to generate a two-dimensional code; the two-dimensional code is typed into the VIP (very important person) information card of the client; and when the VIP information card of the client is used, the two-dimensional code is read to decode and decipher to obtain the client information. According to the two-dimensional code based clothing industry client information management method disclosed by the invention, data for describing the client identity information and measurement data for describing the client body type information are packaged into the two-dimensional code to make the VIP information card of the client; when the client customizes or purchase clothes, the client only needs to input the two-dimensional code in the VIP information card into the reading terminal of a clothes manufacturer or a store; and the system can automatically read the user body type data to customize. The method disclosed by the invention has the advantages of low cost, big information storage content and convenience in popularization, and the efficiency and the safety of the clothes industry service system can be greatly improved.
Owner:ZHEJIANG SCI-TECH UNIV

Method for enhancing decipher of uplink physical channel

The invention provides a decoding method of enhancing an uplink physical channel by a time division synchronous code division multiple access system. The decoding method includes the following steps: step S301, when an enhanced uplink transmission time interval comes, user equipment determines a data type and a resource multiplexing mode transmitted in the current transmission time interval; step S302, the user equipment determines the length of a transmission block and the modulation type of the enhanced uplink service data; step S303, the user equipment determines the physical layer control channel parameters of the current transmission; step S304, a base station determines the total number of resources used by the user equipment; and step S305, the base station combines enhanced transmission format combined indication to obtain part of the length of a transmission block and the modulation type of service data and then carries out demodulation and decoding; wherein, the data type includes a dispatching service data type and a non-dispatching service data type. In this way, under the condition of no increment of channel load, the invention can avoid the caching of channel data, realize the synchronous demodulation of the channel and improve the receiving efficiency of the channel.
Owner:ZTE CORP

Decipher processing method for digital content format

InactiveCN101466020AMeet technical needsMake up for the limitations of not being able to handle data streamsAnalogue secracy/subscription systemsComputer security arrangementsNetwork packetDigital content
The invention discloses a decryption processing method of SDCF and relates to the technical field of digital copyright protection, aiming at solving the technical problem of SDCF decryption processing. The decryption processing method relates to the following platforms: a DRM agent of a set-top box, a DRM copyright releasing system and a middleware; wherein, the DRM agent comprises an RO management module, a key management module, a content decryption module, a monitoring control module with a playing-before control submodule, a player, a browser and the like. The decryption processing method comprises the following steps: 1) users select programs by a user interface and acquire a global unique program logo and the URL of the program contents; 2) according to the program logo, the playing-before control submodule locally searches the corresponding RO and checks the limits to rights; 3) according to the URL in a data packet for transmitting digital contents, the content decryption module acquires the corresponding RO, a decryption mode and a content key to finish the decryption. The decryption processing method has the characteristics that: the network load can be reduced; the operation is simple and convenient; and the technical requirements can be satisfied.
Owner:SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products