Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

136results about "Alarms" patented technology

Methods for combating malicious software

ActiveUS20090077664A1Memory loss protectionError detection/correctionCausal treeData segment
A method for combating malware monitors all attempts by any software executing on a computer to write data to the computer's digital storage medium and records details of the attempts in a system database having a causal tree structure. The method also intercepts unauthorized attempts by executing objects to modify the memory allocated to other executing objects or to modify a selected set of protected objects stored on the digital storage medium, and may also intercept write attempts by executing objects that have a buffer overflow or that are executing in a data segment of memory. The method may include a procedure for switching the computer into a quasi-safe mode that disables all non-essential processes. Preferably, the database is automatically organized into software packages classified by malware threat level. Entire or packages or portions thereof may be easily selected and neutralized by a local or remote user.
Owner:ROBOT GENIUS

Pre-warning method for vehicle

The invention discloses a pre-warning method for a vehicle. According to the method, the most appropriate pre-warning rule can be customized according to specific feature information of the vehicle, the pre-warning accuracy is high, and risks in the vehicle driving process are greatly reduced. The method is executed by a vehicle terminal and a background processing system mounted on the vehicle and comprises steps as follows: (1), indexes requiring attention are abstracted according to factors related to driving safety, and a corresponding weighted value is set for each index; (2), vehicle data are collected and comprise static data, vehicle driving dynamic data, space data and driver information; (3), a risk coefficient of each index is calculated according to the weighted value of each index and the corresponding vehicle data, the risk coefficients of all the indexes are accumulated, and a total risk coefficient is obtained; (4), whether the total risk coefficient is in a specified range is judged, if yes, the step (5) is executed, and otherwise, the step (2) is executed; (5), a pre-warning message is sent to the vehicle terminal.
Owner:BEIJING ZHONGJIAOXING ROAD INTERNET OF VEHICLES TECH CO LTD

Eye guard with voice indication

InactiveUS20080082179A1Less interferenceIncrease power consumptionComputer controlElectric controllersElectricityDisplay device
An eye guard with voice indication is provided, and it includes an eye guard body, a filter, a display device and a voice output device. The display device is mounted inside the eye guard body to display a circumstance value or operating condition information. Furthermore, the voice output device is electrically connected with the display device and includes a main controller, a power supply, a sound output controller, a sensor circuit and a drive circuit. The sensor circuit has at least one sensor exposed on an external surface of the eye guard body and defined in a supposed centerline of the filter to detect the surrounding circumstance. Thus, the circumstance value and the operation condition information are noticed in the form of voice and vision simultaneously for the operators.
Owner:YANG YEA CHYI

Locks for wearable electronic bands

InactiveUS20170039833A1Receivers monitoringLocks for portable objectsLocking mechanismEngineering
Provided is an electronic lock for wearable electronics, the electronic lock including: a button assembly; a spring assembly coupled to the button assembly, the spring assembly comprising: two bent arms configured to compress under a force applied to the button assembly; and an aperture configured to receive a stopping element when the locking mechanism is in a locked position; an actuator configured to electronically control movement of the stopping element in and out of the aperture; and a control circuit comprising: a tangible non-transitory machine readable media storing instructions that when executed by one or more processors of the control unit effectuate operations comprising: receiving a request to unlock the locking mechanism; sending a request for authentication; receiving authentication information; and controlling the actuator to move the stopping element from the locked position.
Owner:CEDAR LANE TECH INC

Device and method for monitoring and early warning of flood damages based on multi-resource integration

ActiveCN105894741AImprove accuracyExact approximation to the true solutionHuman health protectionAlarmsMulti resourceRadar
The invention discloses a device and method for monitoring and early warning of flood damages based on multi-resource integration. The device comprises a hydrological actual state module, a flow forecast module, a weather forecast module, a radar analysis module, a forecast integration module and a module for product display and early warning release. The method comprises the steps that (1) the hydrological actual state module reads and monitors monitoring point data; (2) the weather forecast module reads input data and parameters to carry out weather mode forecasting; (3) the flow forecast module carries out flow forecasting according to the weather mode forecast and the monitoring point data provided by the hydrological actual state module; (4) the radar analysis module reaches basic data of a radar and estimates precipitation and optical-flow extrapolation; (5) the forecast integration module integrates and outputs information of the flow forecast module and the radar analysis module; and (6) the module for the production display and the early warning release completes the product display and the early warning release. The device and the method consider accuracy of radar extrapolation forecasting in forecasting of the position of a precipitation system and also consider capacity of numerical mode forecasting, so that limitations of the single method are avoided.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

System and Method for Detecting and Evicting Malicious Vehicles in a Vehicle Communications Network

ActiveUS20110214178A1Improve performanceReduce impactMemory loss protectionError detection/correctionMathematical modelSimulation
In a vehicle communication network, some vehicles may be used by attackers to send false information to other vehicles which may jeopardize the safety of other vehicles. Vehicles should be able to detect malicious communications activities and to mitigate the impact of malicious vehicles by evicting (eliminating) suspected malicious vehicles from the system. Evicting a vehicle is to ignore the messages sent from the vehicle for a specified time period. Voting and sacrifice principles are combined using a mathematical model based on the “Mafia Game”. The Mafia Game model focuses on the relative size of the group of attackers within a neighborhood necessary to dominate the entire network in the neighborhood (i.e., to eventually evict all the innocent vehicles).
Owner:PERSPECTA LABS INC

Credit card verification system and method

InactiveUS6912312B1Accurate comparisonElectric signal transmission systemsImage analysisCredit cardCommunication unit
The invention provides a credit card verification system, including a credit card company data storage and communication unit (4) for recording and storing data concerning authorized credit card holders, including an electronically reproducible image of each credit card holder, means (6) for introducing the image into the company data storage unit, and at least one remotely positioned credit card reader (10) and image display meants (12) communicating with the company data storage unit, for selectively retrieving data from the storage unit to be displayed on the image display means, to be viewed and approved by the person providing sales services. The invention also provides a method for verifying the identity of a credit card holder effecting a tansaction and a method enabling credit companies to monitor and verify credit card holder identity when a payment transaction is performed at a sales terminal.
Owner:CALLAHAN CELLULAR L L C

Anti-theft method based on compass short message function and anti-theft system based on compass short message function

ActiveCN103150874ARealize anti-theftAnti-theft in timeAnti-theft devicesAlarmsComputer terminalMobile Web
The invention provides an anti-theft method based on a compass short message function. The anti-theft method based on the compass short message function comprises the following steps: arranging an alarm information receiving address in advance; collecting gesture data of a target device in real time; judging whether a carrier is in a static state according to acceleration data, when the carrier is not in the static state, judging whether the acceleration data and replacement exceed preset values, when the acceleration data and the replacement exceed the preset values, judging that the target device is stolen, and retransmitting alarm information to the alarm information receiving address through a compass communication satellite or a mobile network. The invention further provides an anti-theft system based on the compass short message function. The anti-theft system based on the compass short message function comprises a compass receiving and transmission terminal, a gesture sensor and a controller. The controller is used for storing the preset alarm information receiving address, and judging whether the target device is stolen. The compass receiving and transmission terminal is used for retransmitting the alarm information through the compass communication satellite. The gesture sensor contains compass navigation location, and is used for collecting the gesture data of the target device. The anti-theft method based on the compass short message function and the anti-theft system based on the compass short message function are capable of timely carrying out effective alarms.
Owner:CHENGDUSCEON ELECTRONICS

Alert transmission apparatus and method for policy-based intrusion detection and response

InactiveUS7386733B2Memory loss protectionData taking preventionManagement toolClient-side
An alert transmission apparatus for a policy-based intrusion detection and response has a central policy server (CPS) and an intrusion detection and response system (IDRS). In the CPS, a policy management tool generates security policy information and then stores the generated security policy information in a policy repository. A COPS-IDR server sends the information to the IDRS and an IDMEF-XML-type alert transmission message to a high-level module. An IDMEF-XML message parsing and translation module stores a parsed and translated IDMEF-XML-type alert transmission message in an alert DB or provides the message to an alert viewer. In the IDRS, a COPS-IDR client generates the IDMEF-XML-type alert transmission message and provides the message to the CPS. An intrusion detection module detects an intrusion. An intrusion response module responds to the intrusion. An IDMEF-XML message building module generates an IDMEF-XML alert message and provides the message to the COPS-IDR client.
Owner:ELECTRONICS & TELECOMM RES INST

System and method for securing computers against computer viruses

ActiveUS8458797B1Memory loss protectionDigital data processing detailsProgramming languageAntidote
In one embodiment, an antivirus mechanism (e.g., antivirus program) in a computer initiates shielding procedures in response to a triggering event indicative of a presence of a virus in the computer, the virus being of a type not recognized by the antivirus program. The shielding procedures advantageously protect important components of the computer while the antivirus program does not have the requisite antidote to directly deal with the virus.
Owner:TREND MICRO INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products