Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3779 results about "Transfer procedure" patented technology

DEFINITION of 'Transfer Procedures'. The procedure by which ownership of a stock moves from one party to another. The transfer agent follows a detailed, documented series of steps governed by the SEC to ensure that a transaction has been completed.

Method and apparatus for transferring a communication session

Session Inter-Device (SID) mobility networks (50, 100, 150) are described in which a seamless transfer of a communication session from a first device (56. 106, 116) to a second device (66, 116, 166) can be achieved without interrupting the active session. According to the SID mobility network (50), the transfer can be accomplished by transferring away from the Transferring Node or first device (56) the IP address associated with the active session (58) so that the network (50) will route the session to the desired Target Node or second device (66). The Transferring Node (56) transfers its IP address (58) to the Agent (60) and stops requesting data packets addressed to its IP address (58). The Agent (60) then begins to request and eventually receive the packets addressed to the Transferring Node's IP address (58). The Agent (60) then transfers the packets to the Target Node (66). In an alternate SID mobility network (100), the Transferring Node (106) transfers a session specific IP address (114) to the Agent (110). The Agent (110) then transfers packets sent to the session specific IP address (114) to the Target Node (120). In another SID mobility network (150), the Transferring Node (162) obtains a temporary IP address (170) and transfers its IP address (164) to a Session Agent (166). The Session Agent (166) begins to request and eventually receive the packets addressed to the Transferring Node's IP address (164), and for each received packet determines if it belongs to the session the Transferring Node (162) requested to transfer to the Target Node (176). If it does, the Session Agent (166) will transfer the packet to the Target Node (176) at the Target Node's IP address (178). If it does not, the Session Agent (166) will transfer the packet to the Transferring Node (162) at its temporary IP address (170). In each SID mobility network, the session with respect to the Correspondent Node continues without interruption throughout the transfer, thereby providing a seamless transfer of the session from a first device to a second device.
Owner:GOOGLE TECH HLDG LLC

Internet of Things smart home security gateway system

ActiveCN104580233AEnhanced defense against attacksRealize free decouplingUser identity/authority verificationNetwork connectionsThe InternetSecure authentication
The invention relates to an Internet of Things smart home security gateway system. The system comprises a user side, a security gateway and a terminal node. The user side and the terminal node each comprise a data encrypting/decrypting module used for encrypting/decrypting a sent control order and received data through a preset encrypting program on a remote client side or the terminal node; the security gateway comprises a safety communication module, a user access control and node identity authentication module, a credible platform module and a log audit and alarm module; the safety communication module achieves data safety filtering, reconstructing and forwarding and guarantees safety of the bi-direction transmission; the credible platform module is used for achieving system safety authentication, user behavior credibility analysis, data sealing storage and free decoupling and can be independently maintained and upgraded; the log audit and alarm module is used for recording user access and node authentication behaviors, carrying out safety audit on the operation of viewing logs and giving a timely alarm for an abnormal phenomenon found in the gateway system safety monitoring process. By means of the Internet of Things smart home security gateway system, the safety performance of a smart home system and the running efficiency of a gateway can be improved, and a safety guarantee is provided for Internet of Things smart home.
Owner:重庆中邮信科集团股份有限公司

DSAM (Dynamic Slot-time Allocation Method) of scale-extensible single-jump ad hoc network supporting QoS (Quality of Service)

The invention discloses a DSAM (Dynamic Slot-time Allocation Method) of scale-extensible single-jump ad hoc network supporting QoS (Quality of Service), comprising the following steps of: requiring total network nodes to complete broadcasting beacon frame in the process of networking initialization, judging whether each node in the network successfully receives the broadcasting beacon frame of remainder nodes or not by adopting a distributed manner, thereby obtaining sequentially ordered unique identifiers and the total quantity of the network nodes at networking initialization time. In the running process of the network, the time axis of the total network nodes are synchronously divided into a series of continuous network frames without fixed lengths, each node invokes data transmission within each network time frame, and the transmission process comprises four stages of node synchronization, time-slot requirement, time-slot allocation and data transmission; meanwhile, the method can effectively support a new node to access the network and a node to quit so as to meet the requirement of network scale dynamic extension. And the simulation experiment data in a wireless network simulation environment Qua1Net proves the validity of the method.
Owner:WUXI JUWEI TECH CO LTD

Fast ATA-compatible drive interface with error detection and/or error correction

An ATA-compatible drive interface with error correction and detection capabilities is disclosed. Being fully ATA backward compatible, this interface functions with the same physical cable and connectors as current ATA systems, employs bus drivers that are the same as or backward compatible with those provided by earlier versions of the ATA standard and uses signals with cable signal transitions no faster than those presently seen by current ATA devices. The error detection feature indicates when a data block is erroneously transferred between the device and host; the error correction feature identifies the words transmitted in error and corrects those words on the receiving side of the interface. So that ATA backward compatibility is maintained, the data integrity checking feature does not require additional words in a data transfer, and the data correction feature does not require new data transfer protocols or additional data transfer overhead. Also disclosed are interface circuitry and a new ATA-compatible transfer mode capable of transferring data at 40 MB/sec, the rate supported by local bus adapters for disk drives. Given the physical limits of the ATA cables and connectors, the error correction and detection features are especially useful for correcting data words corrupted during high-speed transmission; however, error correction and detection can also operate independently of the fast transfer mode. Consistent with full backward compatibility, a hard drive configured with the new, fast, error-correcting interface is transparently functional when plugged into a current ATA adapter provided by a legacy computer system.
Owner:SEAGATE TECH LLC

Data transmission method, device and system

The invention provides a data transmission method, a data transmission device and a data transmission system. The method comprises the steps of generating an asymmetrical secret key pair including a first public key and a first private key, and sending a data request carrying the first public key to a server side; receiving a ciphertext and a second public key sent by the server side, wherein the second public key is the public key in the asymmetrical secret key pair acquired by the server side, the asymmetrical secret key pair acquired by the server side also comprises a second private key, the ciphertext is information generated by encrypting a seed parameter used for generating an offline payment code by using a sharing secret key, and the sharing secret key is the secret key by using a preset secret key negotiation algorithm according to the second private key and the first public key; and generating the sharing secret key by using the secret key negotiation algorithm according to the first private key and the second public key, using the sharing secret key to decrypt the ciphertext, thus acquiring the seed parameter. According to the method, the device and the system provided by the invention, security of the data during a whole transmission process is ensured, and decryption and encryption efficiency is also improved.
Owner:ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products