Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

273 results about "Recovery techniques" patented technology

Selective data encryption using style sheet processing

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:IBM CORP

Selective data encryption using style sheet processing for decryption by a key recovery agent

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:PHONENICIA INNOVATIONS LLC SUBSIDIARY OF PENDRELL TECH

Selective data encryption using style sheet processing for decryption by a group clerk

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or “XML”, document) carrying key-distribution material, such that by using an augmented document processor (e.g., an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Owner:IBM CORP

Mortar recovery technique for cutting single-crystal and polycrystalline silicon wire

The present invention relates to a technique of recovering mortar used in the wire cutting of monocrystalline silicon or polycrystalline silicon. Silicon is an important material for solar batteries, semiconductors, liquid crystal displays, etc. A silicon rod is cut into silicon wafers by the wire cutting technique, and in the process, a wire-cutting machine needs to be added with cutting liquid mortar, which is mainly composed of liquid phase polyethylene glycol and solid phase silicon carbide powder. When the wire-cutting machine cuts the silicon rod, the solid particles in the mortar are changed into waste mortar as the silicon carbide grinds the silicon rod and a steel wire. If the waste mortar is discharged directly, environment is polluted, and the raw material is wasted. The present invention adopts the mortar-recovering technique to recover the waste mortar, so that the waste mortar can be reused and the discharging of the three wastes can be reduced, so while reducing production cost, the mortar-recovering technique can protect environment. The technique of recovering mortar used in the wire cutting includes the following flow: waste mortar dope, one-step membrane filtration and PEG liquid; waste mortar dope, one-step membrane filtration, cleaning, powder drying, powder classification and SiC powder.
Owner:正申科技(北京)有限公司

System and method for authentication of a workpiece using three dimensional shape recovery

A workpiece authentication system uses shape recovery techniques to extract explicit three dimensional (“3-D”) features of the surface geometry of the designated portion of a workpiece from images produced using different lighting conditions. The system then bases authentication on the 3-D surface features. The system recovers surface normals, or equivalently gradients, for selected locations within a designated portion of the workpiece from multiple enrollment images produced under different illumination conditions. The system then encodes the surface normal information into authentication indicia that is placed on the workpiece and/or stores the surface normals or related information. Thereafter, the system determines that a given workpiece is authentic if the surface normals recovered from various verification images correspond to the stored surface normal information or the surface normal information encoded into the indicia. Alternatively, the system may use the surface normals to predict what an image should contain when the workpiece is subjected to a particular lighting condition. The system then determines that the workpiece is authentic if the predicted image and the image produced using the workpiece correspond. The system may instead encode brightness patterns associated with one or more enrollment images into the indicia. The system then recovers surface normals from images produced during verification operations, predicts what the brightness image should contain and compares the enrollment image to the prediction.
Owner:ESCHER GROUP

Method and apparatus for providing atrial autocapture in a dynamic atrial overdrive pacing system for use in an implantable cardiac stimulation device

Techniques for providing capture verification during overdrive pacing are described. If an overdrive pacing pulse fails to evoke capture (i.e. a loss of capture occurs), a high voltage backup pulse is automatically delivered. Once a second loss of capture occurs during a single sequence of overdrive pacing pulses, an overdrive pulse capture threshold detection search, described herein, is performed while overdrive pacing continues. Various techniques for providing rate recovery are also described herein. The rate recovery techniques are designed to avoid problems that might arise from possible fusion of intrinsic beats and overdrive pacing pulses that fail to evoke capture. In a first rate recovery technique, capture detection is suspended during rate recovery due to the possibility of fusion. Instead, an extra safety margin is added to the overdrive pulses. Once two intrinsic beats are detected, automatic capture verification is reactivated for the next two beats to verify capture before the new overdrive rate is finally established. In a second rate recovery technique, capture verification is maintained throughout rate recovery but the pulse magnitude is increased to a high output mode voltage to avoid any risks of fusion. After the output is increased to the high output mode voltage, a subsequent loss of capture is considered to be an intrinsic event for the purposes of terminating rate recovery. In a third rate recovery technique, capture verification is maintained during rate recovery and the output energy is not increased to the high output mode voltage unless loss of capture is first detected. Subsequent loss of capture events are then counted as P-waves.
Owner:PACESETTER INC

Subsurface imagery for temperature measurement and fluid flow for oil recovery using electromagnetic impedance tomography (EMIT)

A new application of electromagnetic tomography is described directly related to the efficient recovery of oil and gas as well the removal of unwanted liquids from subsurface formations. The process involves the deployment of both surface and a single borehole magnetic dipole structures used for both transmitting and receiving low frequency electromagnetic energy. The surface antenna consists of circularly concentric arrays of small receiving solenoid antennas and the downhole system consists of one or more solenoid antenna in a single borehole. The concentricity of the surface array is centered about or in proximity to the borehole axis. The electromagnetic field radiated by the downhole antenna is received by each surface antenna. The amplitude and phase of voltages and currents received by each surface antenna is electronically processed based on the theoretical processing principles similar to what has been recently established for electromagnetic impedance tomography (EMIT). Several concentric surface antenna arrays with electronic switching between each circular array and the downhole solenoid will have the ability to image the spread and movement of oil and gas during thermal treatment and provide three dimensional temperature measurement. The oil movement to recovery wells may be provided by radiofrequency heating or steam flood as in enhanced oil recovery. This information allows for developing very efficient oil and fluid recovery techniques by actually observing tomographic images developed according to this invention.
Owner:KSN ENERGIES

Method for extracting vanadium from vanadium-containing steel slag by using highly-alkaline sodium hydroxide medium

The invention relates to a method for extracting vanadium from vanadium-containing steel slag by using a highly-alkaline sodium hydroxide medium, belonging to the technical field of metallurgy. The technical scheme comprises the following steps: adding steel slag, water and NaOH into a reactor together, wherein the mass concentration of the NaOH solution is 65-90%; decomposing and leaching under atmospheric pressure, and diluting the obtained slurry with a diluter to obtain a slurry mixture; and separating the slurry mixture by filtering at constant temperature, and washing the slag with a washing solution to obtain tailings and a vanadium-containing water solution. The method provided by the invention can be implemented under atmospheric pressure at low temperature (greatly lower than the roasting temperature in the traditional pyrogenic process), and is easy to operate and safe; and the extraction rate of vanadium is greatly higher than that of the existing vanadium recovery technique based on the pyrogenic process and wet process, the one-time recovery rate of vanadium is 85-90%, and the total content of vanadium in the tailings is 0.3-0.6 wt%. The invention solves the problem that vanadium in the vanadium-containing steel slag can not be easily recovered, and has the advantages of high recovery rate of vanadium, low production cost, favorable economic benefit and environmental benefit, and the like.
Owner:承德承钢柱宇钒钛有限公司

Mimicry switch heterogeneous executor cleaning recovery method and device

The invention discloses a heterogeneous executor cleaning recovery method and device in a mimicry switch. The method comprises the steps that a mimicry scheduler judges downlink data from a pluralityof heterogeneous executors, and marks a to-be-cleaned specified heterogeneous executor; specifying a heterogeneous execution body to restart, and then specifying the heterogeneous execution body to send a normal protocol negotiation message to try to interact with the mimicry scheduler; the mimicry scheduler detects whether the specified heterogeneous executor is in a cleaning state or not according to the protocol negotiation message, the message sending process is repeated until the state of the specified heterogeneous executor is recovered, and the mimicry scheduler is notified; and the mimicry scheduler marks that the state of the specified heterogeneous executor is normal. According to the method, under the condition that protocol stacks on the heterogeneous executors do not need to be modified, the normal working state can be quickly restored when one or more heterogeneous executors are attacked by the outside or the inside of the heterogeneous executors is abnormal, and the method has important guiding significance for the cleaning and restoring technology of the multimode heterogeneous executor architecture system.
Owner:PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products