Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

211 results about "Key issues" patented technology

Key Issues. Leaders in healthcare are committed to a healthcare system focused on meeting needs of consumers. Information will empower patients and consumers to make sound healthcare and lifestyle choices, leading to cost-effective healthcare and significantly reduced chronic disease.

System and method for managing data privacy

A system and method for assessing the risk associated with the protection of data privacy by software application. A decision engine is provided to assess monitor and manage key issues around the risk management of data privacy. The system creates a core repository that manages, monitors and measures the data privacy assessments of applications across an institution (e.g., a corporation). The system and method employs automated questionnaires that require responses from the user (preferably the manager responsible for the application). The responses are tracked in order to evaluate the progress of the assessment and the status of the applications with respect to compliance with the enterprise's data privacy policies and procedures as well as the regulations and laws of the jurisdictions in which the application is operated. Once a questionnaire has been completed, the application is given ratings both with respect to the data privacy impact of the application and the application's compliance with the data privacy requirements. If a risk exists, a plan for reducing the risk or bringing the application into compliance can be formulated, and progress towards compliance can be tracked. Alternatively, an identified exposure to risk can be acknowledged through the system, which requires sign off by various higher level managers and administrators.
Owner:JPMORGAN CHASE BANK NA

System and method for managing data privacy

A system and method for assessing the risk associated with the protection of data privacy by software application. A decision engine is provided to assess monitor and manage key issues around the risk management of data privacy. The system creates a core repository that manages, monitors and measures the data privacy assessments of applications across an institution (e.g., a corporation). The system and method employs automated questionnaires that require responses from the user (preferably the manager responsible for the application). The responses are tracked in order to evaluate the progress of the assessment and the status of the applications with respect to compliance with the enterprise's data privacy policies and procedures as well as the regulations and laws of the jurisdictions in which the application is operated. Once a questionnaire has been completed, the application is given ratings both with respect to the data privacy impact of the application and the application's compliance with the data privacy requirements. If a risk exists, a plan for reducing the risk or bringing the application into compliance can be formulated, and progress towards compliance can be tracked. Alternatively, an identified exposure to risk can be acknowledged through the system, which requires sign off by various higher level managers and administrators.
Owner:JPMORGAN CHASE BANK NA

Announced dynamic access probability protocol for shared bandwidth networks

A system and a method for a dynamic probability access protocol for determining access to shared channels. Some networks have a common channel which is shared by many users. A key issue in such networks is the allocation of the shared channel among many competing users. The system and method of the present invention enable media access control in shared bandwidth networks. When the user wishes to send a message, the user transmits with a probability p, which depends on the load on the channel. The probability p is announced by the network, and transmitted to the users as a broadcast message. Under conditions of low load, the probability p approaches 1, while at high load p is relatively low. This media access control protocol guarantees high channel utilization at high load, as well as low delay at low load periods. The proposed method is applicable on wireless networks, such as cellular networks and satellite-based networks. In addition, the method and system of the present invention can be used in wired networks, for other applications such as local area networks (LAN), client / server networks, and accessing a Web site through the Internet. The method and system of the present invention are able to reduce the likelihood of collisions, without increasing the access delay at low load periods.
Owner:RAMOT UNIV AUTHORITY FOR APPLIED RES & INDAL DEVMENT

Distribution of Session Keys to the Selected Multiple Access Points Based on Geo-Location of APs

In the public WLAN systems, reliable user re-authentication for mobility support is an essential step. However, re-authentication during handoff procedures causes long handoff latency which deteriorates the quality of service specifically for real-time multimedia applications. One possible solution is to authenticate the Mobile Node (MN) in advance with all the neighboring Access Points (APs) and distribute the Session Keys to them. However, the key issue is how to optimally and efficiently select the neighboring APs. In the preferred embodiments, we propose a system that takes into account the user current “Geo-Location”, “Mobility Pattern” and “Application Running on MN”; estimates the “Expected Mobility Zone” (EMZ) and selects an appropriate set of candidate APs corresponding to the MN's geo-location. The EMZ may comprise of APs belonging to “Intra-domain”, “Inter-domain” or “Inter-technology Networks” (e.g., WLAN, WiMAX, and Cellular etc). The system assumes that not only the Mobile Nodes but also the Fixed Nodes (APs or Base Stations) are capable of knowing their Geo-Location Coordinates X, Y, Z. This capability may come either by integrating GPS receiver or through any other alternate, state of the art or future positioning technologies in the APs.
Owner:FOUR BATONS WIRELESS LLC +1

Method for executing structured symbolic machine code on a microprocessor

The invention describes a method for executing structured symbolic machine code on a microprocessor. Said structured symbolic machine code contains a set of one or more regions, where each of said regions contains symbolic machine code containing, in addition to the proper instructions, information about the symbolic variables, the symbolic constants, the branch tree, pointers and functions arguments used within each of said regions. This information is fetched by the microprocessor from the instruction cache and stored into dedicated memories before the proper instructions of each region are fetched and executed. Said information is used by the microprocessor in order to improve the degree of parallelism achieved during instruction scheduling and execution. Among other purposes, said information allows the microprocessor to perform so-called speculative branch prediction. Speculative branch prediction does branch prediction along a branch path containing several dependent branches in the shortest time possible (in only a few clock cycles) without having to wait for branches to resolve. This is a key issue which allows to apply region scheduling in practice, e.g. treegion scheduling, where machine code must be fetched and speculatively executed from the trace having highest probability or confidence among several traces. This allows to use the computation resources (e.g. the FUs) of the microprocessor in the most efficient way. Finally, said information allows to re-execute instructions in the right order and to overwrite wrong data with the correct ones when miss-predictions occur.
Owner:THEIS JEAN PAUL

Access control for rental cars

Cars of a car rental system are made operable by having a renter present a digital key issued from the car rental system. The digital key specifies the starting date and time of a given rental transaction, and the identification of the car the key is for. The digital key is further signed by the car rental system for authenticity. A prospective renter makes online reservation over the Web and downloads into a portable storage device a digital key which can be used to operate the reserved car on the day the reservation is made for. On the pickup day, the renter goes to the car and inserts the portable storage device into a slot on the car. Upon successful verification of the digital key, the car is enabled and the renter can keep the car until he or she wants to return the car. The return process starts by having the renter obtain a invalidated digital key from the car. Once the rental car invalidates the digital key provided by the renter, the renter can no longer operate the rental car. Since the in-car controller is able to decipher the given authorization information, there is no need to re-program the in-car controller for each renter. The renter will be held liable for the rental car until he or she presents the invalidated digital key to the central station of the car rental system. To prevent a lost digital key from being used by unauthorized parties, a digital key can contain information such as a personal identification number (PIN) or a hash of the PIN of the authorized renter. For extra protection, the renter can opt to include his or her PIN in the digital key when the key is created by the car rental system. The parking lot of the car rental system can be operated without security personnel checking for proper authorization.
Owner:WAYMO LLC

Electronic door lock management method and system based on NFC (near field communication) intelligent electronic equipment

The invention discloses an electronic door lock management method and system based on NFC (near field communication) intelligent electronic equipment. The method comprises the following steps of: receiving an electronic key generation request sent by a request end, generating an electronic key record comprising electronic door lock opening information and an NFC intelligent electronic equipment communication number, receiving an electronic key query request sent by the NFC intelligent electronic equipment, and pushing the electronic key record to the NFC intelligent electronic equipment. An electronic key issuing request is initiated to a management server by the request end, electronic key data is transmitted to the NFC intelligent electronic equipment by the management server, and a corresponding electronic door lock is opened by taking the NFC intelligent electronic equipment as an electronic key, so that the effects of remote management and electronic key issuing are achieved, the manufacturing cost of the electronic key is saved, when a problem occurs, the problem can be solved under the circumstance that an electronic key possessor does not need to arrive on the scene of the request end, and the management is convenient; further, the wide-range electronic key management is conveniently achieved under low management cost.
Owner:SHENZHEN LOCSTAR TECH

Electronic intelligent auxiliary writing training and analysis evaluation system

PendingCN108399821AIntuitive evaluationIntuitive Quantitative EvaluationTeaching apparatusVisual comparisonKey issues
The invention provides an electronic intelligent auxiliary writing training and analysis evaluation system, and belongs to the field of electronic auxiliary writing training. Aiming to solve the key problem of good character writing in the writing training, the technical feedback about the writing quality is given in time by using an intelligent electronic or computer auxiliary means to answer thequestions of 'how about the writing'or what's the difference', so that the psychological doubts are resolved and the lack of skills is pointed out. The character image or the information is acquiredby the aid of a sensing device. The device is characterized in that quantitative or visual comparison is conducted on the writing words acquired by the sensing device and the corresponding standard copybook words called out from the system, the consistency quantitative evaluation and/or visual comparison image can be given as the feedback to guide the writing training, so that the writing skills and levels can be improved. The interactive and gain cycling of the writing training process can be realized, the effect is remarkable, the cost is low, the on-purpose, guiding, and assisting properties are achieved. The system makes the user feel it like a good teacher and student, and the writing level is stably improved by means of the aiding.
Owner:常涛涛

Device access authentication method of distribution network automated communication system based on ID

The invention discloses an access authentication method of a distribution network automated communication device based on an ID, belonging to the field of distribution network automated communication systems. The method comprises the following steps that: a distribution automated control center, a regional workstation, a distribution terminal unit and a distribution automated communication network in a centralized control mode are established; and a key management server of the distribution automated control center conducts the key allocation, and the regional workstation and the distribution terminal unit compare whether deciphered data are the same to realize the access authentication, thereby realizing the function that any device can be installed in the distribution network automated communication system only by acquiring the key issued by the key management server. The invention is applicable to the large-scale distribution network, simplifies the key management, utilizes the communication and calculation processing capacities of the regional workstation, and solves the problems of the limited calculation and communication capabilities of the distribution terminal unit. Besides, the invention realizes the mutual authentication of the devices, thereby increasing the safety and improving the access safety of the distribution network device.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

POS machine secret key remote downloading service system and secret key downloading method

The invention discloses a POS machine secret key remote downloading service system and secret key downloading method, and relates to the technique of POS machine information security. The whole scheme comprises seven components of a POS machine terminal, a security chip, a communication module, a random number generator, a secret storage region, a background server and an encryptor; wherein the security chip, the communication module, the random number generator and the secret storage region are contained in the POS machine terminal; the background server is directly connected with the encryptor; the POS machine terminal builds a remote communication channel with the background server through the communication module; and three stages of bidirectional authentication, master secret key issuing and working secret key issuing are successively finished. According to the system and the method, the features that the conventional POS machine secret key downloading method is low in efficiency, low in flexibility and difficult in secondary updating are overcome; the security demand is taken into consideration; high secret demands of one machine one key and one day one key are satisfied; the POS machine secret keys are dynamically updated; and the system and the method are applicable to remote use and rapid deployment of the POS machine.
Owner:DYNAMICODE

Distribution of session keys to the selected multiple access points based on geo-location of APs

In the public WLAN systems, reliable user re-authentication for mobility support is an essential step. However, re-authentication during handoff procedures causes long handoff latency which deteriorates the quality of service specifically for real-time multimedia applications. One possible solution is to authenticate the Mobile Node (MN) in advance with all the neighboring Access Points (APs) and distribute the Session Keys to them. However, the key issue is how to optimally and efficiently select the neighboring APs. In the preferred embodiments, we propose a system that takes into account the user current “Geo-Location”, “Mobility Pattern” and “Application Running on MN”; estimates the “Expected Mobility Zone” (EMZ) and selects an appropriate set of candidate APs corresponding to the MN's geo-location. The EMZ may comprise of APs belonging to “Intra-domain”, “Inter-domain” or “Inter-technology Networks” (e.g., WLAN, WiMAX, and Cellular etc). The system assumes that not only the Mobile Nodes but also the Fixed Nodes (APs or Base Stations) are capable of knowing their Geo-Location Coordinates X, Y, Z. This capability may come either by integrating GPS receiver or through any other alternate, state of the art or future positioning technologies in the APs.
Owner:FOUR BATONS WIRELESS LLC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products