Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

211 results about "Network verification" patented technology

Convolutional neural network power system intelligent fault detection method and system based on Spearman level correlation

The invention provides a convolutional neural network power system intelligent fault detection method and system based on Spearman level correlation, and the method comprises the steps: setting a phasor measurement unit at a regional network node, and carrying out the measurement of data; performing Spearman correlation analysis on the acquired data, and proposing an image generation method basedon an analysis result; establishing an equivalent fault network, verifying the relation between the fault characteristics and the Spearman level correlation, and demonstrating the feasibility of the method; taking the generated image as an initial convolutional layer, and establishing a convolutional neural network architecture based on Spearman level correlation; and verifying the rationality andsuperiority of the method based on PSCAD/EMTDC according to the established architecture. A plurality of types of electric quantity data are comprehensively used for fault diagnosis, the position ofa fault in the power system can be quickly and accurately identified through the convolutional neural network, the problems that the power system has volatility and the traditional detection method isinaccurate due to addition of a distributed power supply and the like are solved, and the robustness and the self-adaptability of the power system are higher.
Owner:NORTHEASTERN UNIV

Searching data

A device or “dongle” (32) is provided for coupling to a Windows-based PC (23). The dongle (32) includes a subscriber identity module (SIM) (15), such as the type used in GSM or UMTS cellular or mobile telecommunications networks. A search engine (40) is accessed by the PC (23) by means of a client application (38) on the PC. The search engine (40) generates a list of search results in response to search criteria in a known manner. Further, the search engine is able to return search results relating to data for which there is restricted access (for example, encrypted data). Such data is identified with a tag which may, for example indicated which users or entities are able to access that data. A user's dongle (32) authenticates that user with the network (3) using a authentication arrangement similar to that employed for authenticating users of a GSM or UMTS mobile telecommunications network. The authenticated identity of the user is communicated to the search engine. The search engine then includes in the search results tagged data items for which the tag indicates that the authenticated user has permission to view. Tagged data items that the authenticated user does not have permission to view are not returned in the search results. Therefore, the user not entitled to view data is not distracted by search results corresponding to data that the user is unable to access. The network (3) may include a key store (51) which stores keys that allow encrypted data items identified by the search engine (40) to be decrypted.
Owner:VODAFONE GRP PLC

System and Method for Securing Data Through a PDA Portal

Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the purchase and/or loyalty process. During the purchase and/or loyalty process, the consumer may need to insure that any content downloaded or used in association with the PDA is secure in how it is collected, assembled, and delivered to the PDA device. This system and method secures the data from its source to when it is actually viewed or used by the authorized user. The PDA may have direct access to an Internet web site portal that offers secure personal content from a content provider, such as, for example, an on-line banking or financial institution. Using the web site portal, the content provider may offer personal or confidential data, such as financial information, to PDA users in a secure (e.g., encrypted) environment. The exemplary system and method may establish a PDA portal link to the web site for collecting specified information for a user and transmitting the information to the remote device. To receive the information, the PDA contacts the portal and establishes a connection, authenticates itself to the network and allows the user to complete secured transactions or transmissions over the network.
Owner:LIBERTY PEAK VENTURES LLC

Method for Carrying Out an Electronic Transaction

The invention relates to a method for carrying out an electronic transaction according to the following steps: Data exchange between a first network subscriber node (1) and a second network subscriber node (2) is carried out by a first terminal (1a) of the first network subscriber node (1) via a first communication network in order to determine transaction data of the transaction; an identification number of a second end device (1b) of the first network subscriber node (1) is inputted into a second communication network, which is different from the first, by means of a first network subscriber node (1) in the first terminal (1a) of the first network subscriber node (1); the identification number and the transaction data from first network subscriber nodes (1) are transmitted (S1,S2; S1′) to a third network subscriber node (3) by means of a third communication network; the validity of the identification number is verified (S3) by the third network subscriber nodes (3) and an associated service provider node (4c) identifies a plurality of service provider nodes (4a, 4b, 4c, 4d) registered by the third network subscriber nodes (3); the verified identification number and the transaction data of the third network subscriber nodes (3) are transmitted to the associated service provider nodes (4c) via a fourth communication network; credit determined by the transmitted transaction data is reserved by associated service provider nodes (4c) for the second network subscriber nodes (2) and the reserved credit is confirmed by the associated service provider node (4c) to the third network subscriber nodes (3) via the fourth communication network; a transaction number is produced and is transmitted from the third network subscriber nodes (3) to the second terminal (1b) of the first network subscriber node (1) via the second communication network; the transmitted transaction number is inputted into the first terminal (1a) of the first network subscriber node (1) and the input transaction number is transmitted (S7′, S8; S7) to the third network subscriber nodes (3) via the third communication network; the transmitted transaction number is verified by the third network subscriber nodes (3) by comparing the previously produced transaction number with the third network subscriber nodes; and the credit reserved by the associated service provider nodes (4c) is confirmed by the third network subscriber nodes (3) via the third communication network to the second network subscriber nodes (2).
Owner:BRUNET & CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products