Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

351results about "Digital data processing details" patented technology

System for controlling exterior vehicle lights

InactiveUS6928180B2Control be disableAvoid componentsVehicle headlampsDigital data processing detailsAutomatic controlImage sensor
A system and method of automatically controlling exterior vehicle lights includes an image sensor and a controller to generate control signals. The control signals are derived based on information obtained from the image sensor as well as other detected parameters pertaining to the detected light source(s), the vehicle having the inventive control system, and the ambient environment. The control circuit may simply turn certain exterior lights on or off, or change the brightness, aim, focus, etc. to produce various beam patterns that maximize the illuminated area in front of the vehicle without causing excessive glare in the eyes of other drivers.
Owner:GENTEX CORP

Methods for combating malicious software

ActiveUS20090077664A1Memory loss protectionError detection/correctionCausal treeData segment
A method for combating malware monitors all attempts by any software executing on a computer to write data to the computer's digital storage medium and records details of the attempts in a system database having a causal tree structure. The method also intercepts unauthorized attempts by executing objects to modify the memory allocated to other executing objects or to modify a selected set of protected objects stored on the digital storage medium, and may also intercept write attempts by executing objects that have a buffer overflow or that are executing in a data segment of memory. The method may include a procedure for switching the computer into a quasi-safe mode that disables all non-essential processes. Preferably, the database is automatically organized into software packages classified by malware threat level. Entire or packages or portions thereof may be easily selected and neutralized by a local or remote user.
Owner:ROBOT GENIUS

Method and apparatus for data retention in a storage system

ActiveUS20050125411A1Digital data information retrievalMemory loss protectionRetention periodSoftware engineering
A system and method are provided for retention of data on a storage system. An application program provides the storage system with data to be stored on the storage system. The application program also provides the storage system with a retention period that indicates a period of time for which the data may not be deleted. When the storage system receives a request to delete the data, it first evaluates the retention period associated with that data to determine if the retention period has expired. If the retention period has not expired, the storage system denies the request to delete the data.
Owner:EMC IP HLDG CO LLC

Method and apparatus for providing network security using security labeling

ActiveUS20050097357A1Reduces potential leakageImprove network securityDigital data processing detailsMultiple digital computer combinationsNetwork security policySecurity level
A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.
Owner:CISCO TECH INC

Smart cover peek

A tablet device includes a display configured to present visual content, a sensor array configured to detect a status of a foldable flap in relation to the display, and a processor configured to operate the tablet device in accordance with the determined status of the foldable flap in relation to the display. In one embodiment, the processor receives a setting value and uses the setting value to execute an application in accordance with the determined relationship of the flap and the display.
Owner:APPLE INC

Internal combustion engine control for improved fuel efficiency

ActiveUS20100006065A1Undesirable vibration reductionImprove efficiencyAnalogue computers for vehiclesElectrical controlWork cycleFuel efficiency
A variety of methods and arrangements for improving the fuel efficiency of internal combustion engines are described. Generally, an engine is controlled to operate in a skip fire variable displacement mode. Feedback control is used to dynamically determine the working cycles to be skipped to provide a desired engine output. In some embodiments a substantially optimized amount of air and fuel is delivered to the working chambers during active working cycles so that the fired working chambers can operate at efficiencies close to their optimal efficiency. In some embodiments, the appropriate firing pattern is determined at least in part using predictive adaptive control. By way of example, sigma delta controllers work well for this purpose. In some implementations, the feedback includes feedback indicative of at least one of actual and requested working cycle firings. In some embodiments, the appropriate firings are determined on a firing opportunity by firing opportunity basis. Additionally, in some embodiments, an indicia of the current rotational speed of the engine is used as a clock input for a controller used to selectively cause the skipped working cycles to be skipped.
Owner:TULA TECH INC

Methods and systems for caching and synchronizing project data

ActiveUS20060070019A1Digital data processing detailsResourcesProject managementComputer science
Methods and systems are provided for intelligently managing project data in a project management application. According to various aspects of the invention, project management data may be loaded and saved to a local cache of a client computer, such as a hard disk cache. The invention also provides a mechanism for reducing the size of data downloaded from and sent to a project server during load and save times.
Owner:MICROSOFT TECH LICENSING LLC

Strong authentication token usable with a plurality of independent application providers

ActiveUS20110099384A1Low costCost can be dividedMultiple keys/algorithms usageDigital data processing detailsPersonalizationUnique identifier
The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential.
The present invention defines furthermore a method to manage the secret keys of strong authentication tokens that can generate dynamic credentials for more than one supported application provider or application provider group using different secret keys for each supported application provider or application provider group comprising generating for each of a batch of strong authentication tokens a token specific master key; personalising each token of said batch with the token specific master key associated with said token; generating for each of a plurality of supported application providers or application provider groups a set of application provider specific token keys, one application provider specific token key for each token of said batch, whereby each application provider specific token key of each of said sets is derived from that token's token specific master key and a unique identifier or indicator of that application provider or application provider group; providing to each application provider or an entity that is responsible for the verification on behalf of said application provider of the dynamic credentials that are generated for said application provider, the corresponding set of application provider specific token keys.
Owner:ONESPAN NORTH AMERICA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products