Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

21078 results about "Monitoring data" patented technology

Multimedia surveillance and monitoring system including network configuration

A comprehensive, wireless multimedia surveillance and monitoring system provides a combination of megapixel digital camera capability with full motion video surveillance with a network, including network components and appliances such as wiring, workstations, and servers with the option of geographical distribution with various wide area carriers. The full service, multi-media surveillance system is capable of a wide range of monitoring techniques utilizing digital network architecture and is adapted for transmitting event data, video and / or image monitoring information, audio signals and other sensor and detector data over significant distances using digital data transmission over a LAN, wireless LAN, Intranet or Internet for automatic assessment and response including dispatch of response personnel. Both wired and wireless appliance and sensor systems may be employed. GPS dispatching is used to locate and alert personnel as well as to indicate the location of an event. Automatic mapping and dispatch permits rapid response. The wireless LAN connectivity permits local distribution of audio, video and image data over a relatively high bandwidth without requirement of a license and without relying on a common carrier and the fees associated therewith. The surveillance system may be interfaced with a WAN (wide area Network) or the Internet for providing a worldwide, low cost surveillance system with virtually unlimited geographic application. Centralized monitoring stations have access to all of the surveillance data from various remote locations via the Internet or the WAN. A server provides a centralized location for data collection, alarm detection and processing, access control, dispatch processing, logging functions and other specialized functions. The server may be inserted virtually anywhere in the Intranet / Internet network. The topology of the network will be established by the geographic situation of the installation. Appropriate firewalls may be set up as desired. The server based system permits a security provider to have access to the appliance and sensor and surveillance data or to configure or reconfigure the system for any station on the network.
Owner:PR NEWSWIRE

Intergrated reservoir optimization

A method of managing a fluid or gas reservoir is disclosed which assimilates diverse data having different acquisition time scales and spatial scales of coverage for iteratively producing a reservoir development plan that is used for optimizing an overall performance of a reservoir. The method includes: (a) generating an initial reservoir characterization, (b) from the initial reservoir characterization, generating an initial reservoir development plan, (c) when the reservoir development plan is generated, incrementally advancing and generating a capital spending program, (d) when the capital spending program is generated, monitoring a performance of the reservoir by acquiring high rate monitor data from a first set of data measurements taken in the reservoir and using the high rate monitor data to perform well-regional and field-reservoir evaluations, (e) further monitoring the performance of the reservoir by acquiring low rate monitor data from a second set of data measurements taken in the reservoir, (f) assimilating together the high rate monitor data and the low rate monitor data, (g) from the high rate monitor data and the low rate monitor data, determining when it is necessary to update the initial reservoir development plan to produce a newly updated reservoir development plan, (h) when necessary, updating the initial reservoir development plan to produce the newly updated reservoir development plan, and (i) when the newly updated reservoir development plan is produced, repeating steps (c) through (h). A detailed disclosure is provided herein relating to the step (a) for generating the initial reservoir characterization and the step (b) for generating the initial reservoir development plan.
Owner:SCHLUMBERGER TECH CORP

Health monitoring system

A health monitoring system which tracks the state of health of a patient and compiles a chronological health history of the patient uses a multiparametric monitor which periodically and automatically measures and records a plurality of physiological data from sensors in contact with the patient's body. The data collected is not specifically related to a particular medical condition but, instead, provides the information necessary to derive patterns which are characteristic of healthy patients as well as those who are ill. The data collected is periodically uploaded to a database in which it is stored along with similar health histories for other patients. The monitor is preferably self-contained in a chest strap which is located on the patient's torso, and makes use of a controller which controls sampling of the desired data and storage of the data to a local memory device pending uploading to the database. The more voluminous data collected is reduced and compressed prior to storage in the local memory device. Preferably, much of the monitor circuitry is run intermittently to conserve power. The monitor data is supplemented with subjective data (such as psychological and environmental conditions) collected from the patient using a handheld data input device which runs a program to solicit information from the patient. The subjective data collected is chronologically aligned with the monitor data in the database such that the health history of a patient includes both objective and subjective medical data.
Owner:THE BRIGHAM & WOMEN S HOSPITAL INC

Home security system

The present invention provides a home security system that includes a home security controller for collecting monitor data from various crime prevention and disaster prevention sensors installed in a home via a home network and notifying the portable terminal when a state of emergency occurs. The home security controller also enables devices in the home to be operated through remote control signals via an external network. The home security system further includes a portable terminal capable of connecting to the external network and having fingerprint data inputting means mounted on the body of the portable terminal for inputting fingerprints used for authentication. The fingerprint data inputting means has an assigned ID number. The home security system further includes a security center server having fingerprint authenticating means for receiving fingerprint data from the portable terminal via the external network and authenticating the fingerprint data through comparisons with registered fingerprint data. The fingerprint authenticating means completes authentication by checking the assigned ID number of the fingerprint data inputting means and matching the received fingerprint data with fingerprint data registered in association with the ID number. The security center server allows a connection between the portable terminal and the home security controller and controls bi-directional communications between the two after the security center server has completed authentication, enabling the portable terminal to receive monitor data from and transmit remote control signals to the home security controller via the external network.
Owner:AMERICAN TECH GRP JAPAN

System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning

The present invention provides a system and method for predicting and preventing unauthorized intrusion in a computer configuration. Preferably, the invention comprises a communication network to which at least two computing devices connect, wherein at least one of the computing devices is operable to receive data transmitted by the other computing device. The invention further comprises a database that is accessible over the network and operable to store information related to the network. A vulnerability assessment component is provided that is operable to execute a command over the communication network, and a data monitoring utility operates to monitor data transmitted over the communication network as the vulnerability assessment component executes commands. Also, an intrusion detection component is included that is operable to provide a simulated copy of the network, to generate a first data transmission on the simulated copy of the network that represents a second data transmission on the communication network, and to compare the first data transmission with a second data transmission. The vulnerability assessment component preferably interfaces with the intrusion detection component to define rules associated with the first and second data transmissions, to store the rules in the database, and to retrieve the rules from the database in order to predict and prevent unauthorized intrusion in the computer configuration.
Owner:PACE UNIVERSITY

Integrated reservoir optimization

A method of managing a fluid or gas reservoir is disclosed which assimilates diverse data having different acquisition time scales and spatial scales of coverage for iteratively producing a reservoir development plan that is used for optimizing an overall performance of a reservoir. The method includes: (a) generating an initial reservoir characterization, (b) from the initial reservoir characterization, generating an initial reservoir development plan, (c) when the reservoir development plan is generated, incrementally advancing and generating a capital spending program, (d) when the capital spending program is generated, monitoring a performance of the reservoir by acquiring high rate monitor data from a first set of data measurements taken in the reservoir and using the high rate monitor data to perform well-regional and field-reservoir evaluations, (e) further monitoring the performance of the reservoir by acquiring low rate monitor data from a second set of data measurements taken in the reservoir, (f) assimilating together the high rate monitor data and the low rate monitor data, (g) from the high rate monitor data and the low rate monitor data, determining when it is necessary to update the initial reservoir development plan to produce a newly updated reservoir development plan, (h) when necessary, updating the initial reservoir development plan to produce the newly updated reservoir development plan, and (i) when the newly updated reservoir development plan is produced, repeating steps (c) through (h). A detailed disclosure is provided herein relating to the step (a) for generating the initial reservoir characterization and the step (b) for generating the initial reservoir development plan.
Owner:SCHLUMBERGER TECH CORP

Method and apparatus for web caching

A method and apparatus for web caching is disclosed. The method and apparatus may be implemented in hardware, software or firmware. Complementary cache management modules, a coherency module and a cache module(s) are installed complementary gateways for data and for clients respectively. The coherency management module monitors data access requests and or response and determines for each: the uniform resource locator (URL) of the requested web page, the URL of the requestor and a signature. The signature is computed using cryptographic techniques and in particular a hash function for which the input is the corresponding web page for which a signature is to be generated. The coherency management module caches these signatures and the corresponding URL and uses the signatures to determine when a page has been updated. When, on the basis of signature comparisons it is determined that a page has been updated the coherency management module sends a notification to all complementary cache modules. Each cache module caches web pages requested by the associated client(s) to which it is coupled. The notification from the cache management module results in the cache module(s) which are the recipient of a given notice updating their tag table with a stale bit for the associated web page. The cache module(s) use this information in the associated tag tables to determine which pages they need to update. The cache modules initiate this update during intervals of reduced activity in the servers, gateways, routers, or switches of which they are a part. All clients requesting data through the system of which each cache module is a part are provided by the associated cache module with cached copies of requested web pages.
Owner:POINTRED TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products