Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

4197 results about "System safety" patented technology

The system safety concept calls for a risk management strategy based on identification, analysis of hazards and application of remedial controls using a systems-based approach. This is different from traditional safety strategies which rely on control of conditions and causes of an accident based either on the epidemiological analysis or as a result of investigation of individual past accidents. The concept of system safety is useful in demonstrating adequacy of technologies when difficulties are faced with probabilistic risk analysis. The underlying principle is one of synergy: a whole is more than sum of its parts. Systems-based approach to safety requires the application of scientific, technical and managerial skills to hazard identification, hazard analysis, and elimination, control, or management of hazards throughout the life-cycle of a system, program, project or an activity or a product. "Hazop" is one of several techniques available for identification of hazards.

Occluder device double securement system for delivery/recovery of such occluder device

Devices, delivery systems and delivery techniques for an occlusion device for the closure of physical anomalies, such as an atrial septal defect, a patent foramen ovale (PFO), and other septal and vascular defects are described. The devices, delivery systems and delivery techniques relate particularly to, but are not limited to, a patent foramen ovale (PFO) occluder made from a polymer tube. Specifically, a petal-shaped occluder with a catch system is provided within a delivery sheath. In certain embodiments, the delivery system includes a first securement system for securing a first end of the occluder and a second securement system for securing a second end of the occluder to a delivery catheter and a delivery wire contained in the delivery system. The securement enable the deployment (and retrieval) of the device. The securement systems enable pushing and pulling of respective ends of the occluder to expand and contract the device by varying its axial length. In one aspect, the first securement system employs a threaded connection and the second securement system employs a suture connection. In another aspect, the first securement system employs a threaded connection and the second securement system employs a collet finger connection. The securement systems are detached when the device has been properly positioned. The securement systems can be manipulated by control systems provided in the control portion of the delivery system.
Owner:WL GORE & ASSOC INC

Method for providing customized and automated security assistance, a document marking regime, and central tracking and control for sensitive or classified documents in electronic format

A software engine runs in a compatible mode with off-the-shelf word processors, e-mail programs and presentation development software and other document development software. The software engine is used for the security classification of sensitive or national security classified information in electronic and resultant hard copy document formats. The software engine ensures that the individual considers all informational portions of a document, that appropriate document marks are employed, that document marks in their electronic format are persistent and that all necessary information, such as classification guides, standards and security regulations, provided by the organization to classify information is at hand and immediately available. In addition to the document sensitivity or classification determination and marking support, the software engine tracks and controls documents and the electronic media storing documents. It also provides warnings and alarms, ad hoc document security analysis and reporting capability to system security administrators with respect to document or network events or captured information that may be indicative of risk to the information requiring protection. The software also provides the ability for an organization to centrally establish and control a security classification or sensitivity marking hierarchy for automated security classification support.
Owner:TURNER JAMES LUKE +1

Novel media file access and storage solution for multi-workstation/multi-platform non-linear video editing systems

A novel system, method and computer program product for accessing digital media files stored in a media storage device via a server device in communication with the media storage device. The method includes providing, via the server, a file virtualization scheme that permits that enables a server to permit multiple non-linear editing workstations and other devices to see and access the same media files (video, audio, graphics, etc.) stored in the media storage device while keeping each workstation and other devices isolated from the others (i.e., unaware that the others exist). In this manner, workstation crash and project file corruption is avoided when multiple users access each other's projects. There is additionally provided a tool for managing the digital media storage system particularly enabling media and corresponding virtual files to be automatically manipulated, e.g., deleted, removed, transferred and synchronized, in response to user requests, all the while automatically retaining the file virtualization features as described. There is additionally provided a tool for allowing multiple non-linear editing systems to safely open up and work from and collaborate on the same “Project”. The tool manages ownership and permissions over different editors' contributions to shared Projects and implements “symbolic links” to create a virtual file and folder structure that creates an “optimized view” of the Project for each editor, that keeps work organized so that it is clear which editor is editing what and that allows each editor to maintain his/her own settings for the Project.
Owner:EDITSHARE LLC

Method of and system for detecting an anomalous operation of a computer system

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles. An attempt to violate the security of the system will result in behavior that is outside the normal activity of the system and thus result in a perturbation of the system in a manner outside the scope of the normal profiles. Such violations are detected by an analysis and comparison of the profiles generated from an instrumented software system against a set of known intrusion profiles and a varying criterion level of potential new intrusion events.
Owner:STRATACLOUD

User online authentication method and system based on living body detection and face recognition

The invention discloses a user online authentication method and system based on living body detection and face recognition. The method includes the user online registration step and the user online authentication step. The user online authentication step comprises the living body detection step, the image processing step, the feature value extraction step, the face comparison step and the result processing step. In the living body detection step, whether an authenticated user is a living body or not is determined and a face picture is acquired. In the image processing step, the collected face picture is processed. In the feature value extraction step, face part features of the processed face picture are extracted. In the face comparison step, extracted feature data of the collected face image are compared with corresponding face data in a user face feature value database, a threshold value is set, and when similarity exceeds the threshold value, the acquired result through matching is output. The user online authentication method and system can avoid authentication cheating through videos including faces, safety of the system is improved, recognition time can be shortened, and recognition accuracy is improved.
Owner:SHANGHAI JUNYU DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products