Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

283 results about "Public information" patented technology

Single click synchronization of data from a public information store to a private information store

A method for transferring public information to a private information store maintained by a private information space manager. The method may include the steps of selecting public information from a public information source; initiating a sync request by selecting a sync request button on the public information web site; and identifying the private information space were the public information is to be stored. In a further aspect, the invention comprises a system for synchronizing public content from a public information web site to a private information store. The system may include a sync enable button on the public information web site; a pop-up window provided by a private information store provided responsive to the sync enable button on the public information web site; and a sync interface transfer button on the pop-up window initiating transfer of the public information to the private information store. In a further aspect, the public information web site is provided by an affiliate server and said affiliate server includes code enabling said sync button by directing a client web browser to the private information store provider. The system may further include at least one synchronization routine synchronizing the public information data with the private information space.
Owner:SYNCHRONOSS TECH

Secure file format

A file format for a secure file for use with a block cipher or a stream cipher, the secure file having a secure client header and a data block appended to the secure client header. The client header has a client information block comprised of a public information block, a private information block and an initialization vector. At least a portion of the private information block is encrypted, and a client information block integrity check value is appended to the client information block, the client information block integrity check value being obtained by performing an integrity check on the client information block. The data block is preferably encrypted and is comprised of a plurality of encrypted data blocks each appended with its own respective integrity check result value. Each of the plurality of data blocks and their respective integrity check result values are obtained by dividing the encrypted data block into n encrypted data blocks, performing an integrity check on a first one of the n encrypted data blocks and the client information integrity check result value appended to the client information block, so as to obtain a first encrypted data block integrity check result value, appending the first encrypted data block integrity check result value to the first encrypted data block, and repeatedly performing, for each of the subsequent n encrypted data blocks, an integrity check on the subsequent encrypted data block and an integrity check result value appended to a previous one of the n encrypted data blocks, so as to obtain an integrity check result value for the subsequent encrypted data block, and appending the subsequent integrity check result value to the subsequent encrypted data block.
Owner:CANON KK

Method to secure credit card information stored electronically

InactiveUS20060282372A1Ensure integrityMinimize expirationAcutation objectsFinanceCredit cardChecksum
A method by which merchants who store sensitive credit card information can secure the information from theft, while minimizing the impact on the customer, as well as minimizing the cost of implementation. The merchant uses a special secured record for the storage of the credit card information for a specific customer. The record consists of two parts. The first part of the record contains public information which is visible to anyone with access to the record. The public information includes the merchant identity, along with information that constrains the use of the record, such as limits on the type of purchase, amount of purchase, or frequency of purchase, as well as the expiration date of the record, approved shipping addresses, and other constraints that make the record effectively useless to anyone except the merchant who created and stored the record, as well as limiting possible abuse by said merchant. The second part of the record contains private information which is encrypted so as to be visible only to parties authorized to view the information. The private part of the record will contain the sensitive credit card information, along with a checksum of the contents of the record. When the record is submitted to the clearing entity, the private part of the record is decrypted using the appropriate key. The checksum is used to verify that the record has not been modified, and that the public and private sections correspond to each other. Once the record is validated, constraints are applied, and if met, the credit card information is used to process the transaction.
Owner:ENDRES TIMOTHY GERARD +1

Information delivery system, delivery request program, transfer program, delivery program, and the like

In an information delivery system including a plurality of node devices connected each other to thereby configure a network, a first node device includes a device for transmitting request information based on unique identification information corresponding to specific common information and request number information indicative of request number of node information to a second node device to thereby request transmission of the node information concerning a plurality of information saving node devices, included in the plurality of node devices and saving specific common information, which is specified out of common information to be shared among the plurality of node devices, and the second node device includes : a device for searching node information corresponding to the identification information and indicated by request number information included in the request information as many as request number upon receipt of request for the specific common information and a device for transmitting the node information as many as at least the requested amount to the first node device when the node information as many as the request number or more is found and to transmit only node information thus found to the first node device in case where the requested amount of node information cannot be found.
Owner:BROTHER KOGYO KK +1

Logistic public information platform system

The invention provides a logistic public information platform system, which is oriented towards production and manufacturing enterprises, drivers and logistics companies, has the functions of logistic information management, information retrieval, identity authentication, vehicle positioning, online insurance effecting and online traction, combines with a logistic information system and an electronic business system for realizing logistic information resource sharing and provides online parking lot one-stop service vehicle and cargo marching for a user. The system is an electronic information platform which is based on Internet and is developed by adopting a B2C (Business to Customer) mode, i.e. an enterprise and consumer transaction mode, wherein the electronic information platform comprises a foreground website and a background management system, the user can log in the foreground website for performing user registration, find required vehicle source information or cargo source information through an information searching function of the website, and submitting an electronic order for concluding a transaction, and an administrator can maintain the content of the foreground website through the background management system. The logistic public information platform system is suitable for logistic information transaction.
Owner:JIAN WANJI LOGISTICS TRANSPORTATION

City management intelligent streetlamp

The invention discloses a city management intelligent streetlamp which comprises a streetlamp body arranged on a municipal road. A core controller is arranged in a lamp post of the streetlamp body. The core controller is connected with an illumination system, a water supply pipeline, an environment monitoring system and a communication system. The illumination system comprises a city streetlamp and a streetlamp controller. The streetlamp controller is in controlled connection through the core controller. The communication system comprises a wireless GPRS gateway module, a WiFi router and a ZigBee wireless unvarnished transmission module. The communication system is connected to a cloud service platform. The cloud service platform is connected with a government public information platform. A public information display is installed on the streetlamp body. The core controller is connected to a public security video monitoring system, a sky net monitoring system and a well lid monitoring managing system. By means of the city management intelligent streetlamp, the air humidity and temperature can be adjusted to a certain degree, the PM2.5 value in the air is reduced, the public information display is further arranged and can play government public information in real time, and due to the arranged public security video monitoring system and the interconnected sky net monitoring system and well lid monitoring managing system, good security work can be done.
Owner:江西中天景建设有限公司

Three-dimension mesh model copyright verification method

The invention provides a three-dimension mesh model copyright verification method, which comprises the following steps that S1, light holographical encryption copyright watermark information is generated; S2, a three-dimension mesh model is preprocessed; S3, a model geometrical characteristic matrix is built in a cylindrical coordinate system; S4, the geometrical characteristic matrix is subjected to QR decomposition to embed copyright watermark information; S5, the three-dimension mesh model embedded with the copyright watermark information is issued on public information platforms such as Internet; S6, the obtained three-dimension mesh model to be detected is subjected to pre-processing for carrying out QR decomposition on the geometrical characteristic matrix to extract a copyright encryption information grey-scale map, a copyright two-value watermark image is obtained through Fourier inversion and filtering by a two-order Butterworth high pass filter, and the copyright ownership of the three-dimension mesh model can be judged through human eye identification. The method belongs to an air space blind watermark algorithm, higher robustness is realized, and the obvious problems that the existing three-dimension mesh model copyright verification method can be easily cracked and copied, and the copyright anti-fake certification cannot be conveniently or effectively carried out are solved.
Owner:UNIV OF SHANGHAI FOR SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products