Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

365 results about "Unique key" patented technology

In database relational modeling and implementation, a unique key (also known as a candidate key, primary key, alternate key or more generally just a key) of a relation is a minimal superkey for that relation; that is, a set of attributes such that...

Unified geographic database and method of creating, maintaining and using the same

The present invention involves a Universal Geographic Database (“UGD”). The UGD is an automated, central or distributed, registry of real-world locations and location-related information for businesses and other entities, analogous to the registry of domain names for Internet and web sites. By this central registry, businesses and other entities are facilitated to post their location and location-related information in a single place, for all users who need or want it; and users can refer to this single place, via the Internet, Web, and other telecommunications devices, to obtain accurate, complete and timely location and location-based information about the registered businesses and other entities. Each record of the UGD is keyed by a proprietary location address (PLA) based on the World Geographic Referencing System (WGRS), and optionally may have one or more proprietary location addresses (PLAs), which also may serve as keys. Associated with the PLA keys, each UGD record generally includes the full name for the business or other entity, its street address, and miscellaneous contact information (e.g., telephone number, facsimile number, e-mail address, internet website address, wireless website address). Other more dynamic, customized information (e.g., store hours, credit cards accepted, inventory, prices, specials, hours, parking) also may be available in the UGD record or linked to the UGD record. Users of any device or service can access the UGD through one or more location name servers (LNS), which can provide access to the UGD or other location-based information linked to the UGD or LNS. Based on the WGRS, PLAs provide, in addition to unique keys for UGD records, a user-friendly notation for location naming in the real-world and on all types of location-sensitive electronic devices, from web phones to in-car navigation systems. Given the UGD, these ULA/PLAs are as important to real-world businesses as their domain names because these WGRS addresses drive real-world commerce to physical business locations just as domain names drive e-commerce Internet or web sites.
Owner:WGRS LICENSING

Methods for embedding image, audio and video watermarks in digital data

A method for embedding an entire image, audio or video watermark sequence within another image, audio or video data sequence with minimum loss of data quality is presented. The method exploits the de-correlation property of data coefficients in the orthogonal transform domain, similar to the application in data compression through transform coding. The present invention describes the usage of a Discrete Cosine Transform as the embedding domain. However, other orthogonal transforms such as Fourier, Walsh-Hadamard, Haar, Sine and Wavelet can also be used for this operation. A unique key derived adaptively from spatial locations registering the thresholds of the ac transform energies is used to unlock or de-watermark the embedded image or audio sequence. Moreover, an exponential filter has been developed to compress and expand the watermark coefficients prior to the embedding and retrieval process. The method can be used in resolving multimedia copyright protection issues arising on the Internet and in the music industry, such as the inclusion of a company's logo or an artist's recorded voice. The method can also be incorporated as a built-in feature for digital recording devices, such as still and video cameras, as well as more recent devices such as VCD and DVD players. Moreover, the method can be applied to the commercial and service sectors, where security in transmission and reception of private information in terms of speech or image is of the utmost importance.
Owner:ST ELECTRONICS INFO SECURITY

Efficient techniques for sharing a secret

An n person secret sharing solution computes n unique keys to be distributed to the secret owners along with an exponentiated version of the secret. The custodian performs an exponent/modulo operation each time one of the keys is received from one of the secret owners. Alternatively, n+1 keys are created by the custodian, and the custodian retains one key after distributing the remaining n keys to the secret owners. After the custodian has received and processed the n keys from the secret owners, he performs an exponent/modulo operation using his own retained key. According to another aspect, a k out of n secret sharing solution involves computing and storing a database having an entry for each unique combination of k keys that could be returned from among the n keys. After k keys have been received, the custodian looks up in the database the entry corresponding to the particular unique combination of secret owners who returned keys. The custodian performs another exponent/modulo operation using the entry retrieved from the database in order to reconstruct the original secret. According to an embodiment, the custodian computes n+1 keys, distributes n of the keys to the secret owners, and keeps one of the keys for himself. The custodian retrieves his own key and performs a final exponent/modulo operation in order to reconstruct the original secret. According to another aspect, a k out of n secret sharing solution involves encrypting the original secret before applying any conventional k out of n secret sharing solution.
Owner:CA TECH INC

Trade records information management system

An information management system for storing related documents, messages, and customer inquires as electronic images for retrieval in a controlled and secure manner. The system is centrally maintained, and provides the capability to manage and integrate different forms of information among multiple remote offices. Information is treated as transaction-related items and are linked together by transaction folders. Inbound paper-based documents are scanned, indexed and reviewed by preprocessing. Document processing from folders is conducted by assigning the item to a Trade Service Representative (TSR) based on routing rules defined by the System Administrator. The TSR has a queue containing documents and inquiries for processing, providing the transaction service representative with a single point of reference to data related to a Letter of Credit, a reimbursement, a collection, and a guarantee. Document work flow can be monitored for backlog and assigned work levels. Transaction folders contain the components related to particular trade services transactions. The folders include all physical input and output media associated with transactions, such as electronic messages, mail items, inquiry history records, system user entered messages, and inbound facsimile messages. The system maintains an internal unique key identifier, to identify each folder and document with the image transaction ID number unique to each item when available from the image management system.
Owner:CITIBANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products