Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

887 results about "Sleep time" patented technology

Interactive virtual character doll

The interactive doll simulates the character of a live person or, in other embodiments a fantasy figure or animal, in essence, simulating a living being that possesses respective human or animal qualities: displaying specific needs, tenderness, intelligence and/or understanding. The doll contains a clock or other timekeeping device and thereby knows of the time of day. It automatically enters a sleep mode at a preset sleep time during which the playtoy remains quiet, and wakens at a preset hour of the day, issuing a verbal statement to let the player know it is time to again play. By issuing a sequence of verbal requests from time to time to the player to take action of various kinds on or with the doll, determines the player's compliance or noncompliance with each such request and issues a verbal message appropriate to such compliance or non-compliance. Some of the verbal requests made are of a kind that occur at a particular time of day in the life of the character being synthesized, such as a request for a food or beverage at breakfast time, lunch time or supper time. And, from time to time at its own initiative, the playtoy may issue verbal messages of affection to the player. That doll is accompanied by external objects that simulate a variety of foods, a beverage, medicine and the like, which the doll is to be applied by the player to the doll pursuant to specific verbal requests from the doll and the doll is able to identify those objects for enhanced interactive play with the player.
Owner:PLAYMATES TOYS

Energy consumption control method under delay constraint in wireless sensor network

The invention relates to the field of wireless self-organizing networks and sensor networks, in particular to an energy consumption control method under delay constraint in a wireless sensor network. The energy consumption control method comprises the following steps of: generating a normal data packet and a pioneer data packet by a source node when data packets in the wireless sensor network need to be transmitted to a base station from the source node, wherein the normal data packet is used for transmitting the data packets, and the pioneer data packet is used for selecting nodes on a transmission path; determining the delay constraint of the nodes on the transmission path; computing the best sleep time of the nodes on the transmission path; applying the best sleep time to a duty ratio self-adaptive adjustment mechanism to obtain new duty ratio to transmit the data packets; and respectively recovering work cycles of all the nodes on the transmission path into an original state after all the data packets are transmitted to the base station. According to the energy consumption control method under the delay constraint in the wireless sensor network, on the premise that the constraint condition of the wireless sensor network on transmission delay is met, the energy consumption of the wireless sensor network is reduced to the maximum limit, and the service life of the wireless sensor network is prolonged.
Owner:RUN TECH CO LTD

Disabling execution of malware having a self-defense mechanism

A dummy debugger program is installed within the user computer system. The dummy program is registered with the operating system as a debugger and may also be registered as a system service as if it is a kernel mode debugger. The dummy debugger program may have the name of a popular debugging program. Dummy registry keys are created that are typically used by a debugger to make it appear as if a debugger is present within the operating system of the user computer. Dummy program folders or dummy program names are created to make it appear as if a debugger is present within the operating system of the user computer. API calls are intercepted by using API hooks and modified to always return a meaningful value indicating that a debugger is present. Malware performing any checks to see if a debugger is present will be informed that a debugger is present and will then shutdown, sleep, terminate, etc. Or, in order to trick malware into thinking that an emulator is present, any API call is intercepted and the sleep time passed in is raised by a couple of milliseconds. Malware will determine that the time parameter passed in is not equivalent to the elapsed time from before the API call to after the call and the malware will determine that an emulator is present and will terminate.
Owner:TREND MICRO INC

Low-power dissipation media access control method of node dynamic state resting

A low-power media access control method of node dynamic sleeping includes the following steps: (1) organizing the network topology to clustering topology and realize a coarse-grained clock synchronization between the node inside the cluster and the cluster head and make the node work and sleep periodically; (2) the nodes have three operating modes: a sending mode, a receiving mode and a cycle work mode, wherein the node of the cycle work mode is characterized in that the nodes work or sleep periodically and the actual work and sleep time period of the nodes changes dynamically and the operation sub-time-period of the neighboring node can be calculated; (3) in one work cycle, the operation sub-time-period of any two adjacent nodes can be overlapped to guarantee the communication; (4) the node can intercept the packet sent by the adjacent node and adjust the sleep time period according to the information carried by the packet to reduce the carrier interception times; (5) dynamically adjusting the busy and idle degree of the node according to different data sampling rates so as to reduce the power consumption while guaranteeing the throughput. The method, which is simple and reliable, has advantages of low power consumption, short delay, strong adaptive capacity and effectively prolonged life cycle of the network.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products