Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

549 results about "Multiple copy" patented technology

Copy and paste multiple items using the Office Clipboard Open the file that you want to copy items from. Select the first item that you want to copy, and press CTRL+C. Continue copying items from the same or other files until you have collected all of the items that you want. Click where you want the items to be pasted.

ISP system using non-geosynchronous orbit satellites

A satellite communication system includes a plurality of satellites, such as low earth orbit satellites, and a plurality of gateways. The satellite communication system is bidirectionally coupled to a terrestrial communication system through at least the plurality of gateways. The satellite communication system and the terrestrial communications system together form a data communication network having a plurality of nodes including source nodes, destination nodes and intermediate nodes. Multiple copies of a packet can coexist within the data communication network, and the packet and its one or more copies are routed, using at least in part satellite-resident routers and gateway-resident routers, over a plurality of different paths between a particular source node and a particular destination node. At least one duplicate copy of a given packet is simply not used during the execution of a packet reordering procedure in the destination node, or at an intermediate node. Certain of the paths are carried over satellite-to-satellite cross-links, while certain other ones of the paths are carried over satellite-to-gateway uplinks and downlinks, and at least one path exists between a user terminal and at least one satellite. In a preferred embodiment the packets are TCP / IP (or equivalent protocol) packets containing information for enabling the selective destruction of a duplicate packet to occur.
Owner:GLOBALSTAR INC

Method for controlling errors in link layer in wideband wireless communication and computer readable media therefor

A method for controlling errors in a wireless link layer using a simultaneous multiple copy scheme and an adaptive forward error correction (FEC) scheme in a wideband wireless communication is provided. The method for controlling errors in a link layer in wideband wireless communication using an automatic repeat request (ARQ) scheme, in which a wideband wireless channel is used for communication between a first node and a second node, includes the steps of (a) estimating the error ratio of a forward (a direction in which a cell is transmitted from the first node to the second node) channel using the state of a backward (a direction in which a cell is transmitted from the second node to the first node) channel, and transmitting a cell, in which a forward error correction (FEC) code having an encoding ratio that varies depending on the estimated error ratio is included in a protocol data unit (PDU) of a wireless link layer, through the forward channel and (b) re-transmitting the copy of a cell transmitted in the step (a), when feedback information that indicates that an error exists in the cell transmitted in the step (a) is received through the backward channel. It is possible to reduce the number of times of re-transmission by improving the probability of correcting forward errors using more error controlling bits as the state of the channel is worse and to minimize the waste of resources using less error controlling bits as the state of the channel is better, to thus obtain the optimal performance and guarantee the minimum delay time.
Owner:SAMSUNG ELECTRONICS CO LTD

RAID system having a selectable unattended mode of operation with conditional and hierarchical automatic re-configuration

Because correct configuration data is essential to the operation of any RAID system, and because multiple copies of the configuration data are kept, not only in the RAID controller itself, but also in each disk drive unit in the configuration, it is imperative that the various copies of the configuration data do not become "out of synchronization", which means that one or more copies of the configuration data are different from one or more other copies of the configuration data. To maintain synchronization of all copies of the configuration data, the current invention compares the configuration data stored in the RAID controllers' NVRAM to that of the current system, and records any new, non-responding, repositioned or unidentified storage devices in a change list. The identities and the attachment points of any storage devices in the change list are then displayed to the user, and various options for correcting the lack of synchronization are provided by enabling one or more function keys that may be selected by the user. One such function key, an "accept change" key, causes the configuration data to be modified by changing the current operational state of any non-responding storage device. A "configuration adjustment" key, when selected by the user, causes the configuration data to be modified to reflect any changes in the attachments points of any repositioned storage deices. An "import configuration" key causes the configuration data to be changed to correspond to that of an unidentified storage device. And a "retry" key gives the user an opportunity to rearrange the system and then re-compares the configuration data in the controller to the current system configuration. When the system is operating in un-attended mode, means are disclosed to automatically perform the "accept change", "configuration adjustment" and "import configuration" functions in priority order so long as the "retry" key has not been enabled. The retry key implies attended operation.
Owner:IBM CORP

Method and system for automating the recovery of a credential store

A system for automating the recovery of a credential store, in which client software generates a temporary key pair based on a new password, and sends client information including the user's name, the public half of the temporary key pair, and the host name of the client computer system to a server system, from which the client information is passed to a recovery process. The client software process displays a prompt indicating that the user should call a help desk. A help desk administrator verifies the user's identity and approves the user's request by causing an approval message to be sent to the recovery process. The recovery process obtains recovery information consisting of either the decryption key(s) for the credential store, or a decrypted copy of the credential store, and encrypts the recovery information using the temporary public key. The client process downloads the recovery information from the server, and decrypts it using private key of the temporary key pair. The credential store can then be decrypted using the recovery information if necessary, then re-encrypted based on the new password. The encrypted recovery information is stored on the server and re-used for a certain period of time, after which it is deleted, thus allowing multiple copies of the credential store to be conveniently recovered.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products