TranVC Team Content

PROCESSING METHOD OF REMOTE ATTESTATION REPORT, DATABASE SERVICE END AND DATABASE CLIENT END

Invented by WANG; Su, LU; Fang, MAI; Yufei This article will help you understand a new patent for making remote attestation easier in database systems. We’ll break it down into three main sections. By the end, you will know why this invention matters, what was done before, and what makes this solution new and helpful.

PROCESSING METHOD OF REMOTE ATTESTATION REPORT, DATABASE SERVICE END AND DATABASE CLIENT END Read More »

AGGREGATED LIKELIHOOD OF UNINTENTIONAL TOUCH INPUT

Invented by PUNDAK; Gilad, GRINBERG; Hanan, ARBEL; Eran, Microsoft Technology Licensing, LLC Touchscreens are everywhere – on our phones, tablets, laptops, and even some fridges. But have you ever tapped your device and nothing happened? Or maybe you accidentally touched the screen and something you didn’t expect happened anyway? This is a common frustration for

AGGREGATED LIKELIHOOD OF UNINTENTIONAL TOUCH INPUT Read More »

System And Method For Efficiently Identifying And Segmenting Product Webpages On An ECommerce Website

Invented by O’NEILL; Allen Keeping product pages up-to-date on eCommerce websites is a huge task. Online stores have thousands, sometimes millions, of products. Each product page holds key details—name, price, images, reviews, and more. These details change all the time. Making sure every page shows the right information can be hard, slow, and expensive. But

System And Method For Efficiently Identifying And Segmenting Product Webpages On An ECommerce Website Read More »

METHOD AND DEVICE FOR RECEIVING PARTIAL INFORMATION REGARDING OTHER APS WITHIN TRANSMISSION MLD IN WIRELESS LAN SYSTEM

Invented by KIM; Namyeong, KIM; Jeongki, CHOI; Jinsoo, JANG; Insun, LG ELECTRONICS INC. Wireless networks keep our lives connected. As new gadgets and smart devices fill our homes, the need for faster and smarter Wi-Fi grows. Today, we look at a recent patent application that tackles a tricky problem in next-generation Wi-Fi: how devices with

METHOD AND DEVICE FOR RECEIVING PARTIAL INFORMATION REGARDING OTHER APS WITHIN TRANSMISSION MLD IN WIRELESS LAN SYSTEM Read More »

MAKING ANATOMICAL MEASUREMENTS USING MAGNETIC RESONANCE IMAGING

Invented by Pezzotti; Nicola, Wenzel; Fabian, Van den Brink; Johan Samuel, Weese; Rolf Jürgen, Flaeschner; Nick, Doneva; Mariya Invanova, Ewald; Arne Welcome! Today, we will explore a new patent application for a medical system that aims to make MRI follow-up imaging more affordable and accessible. We will break down what the invention is, why it

MAKING ANATOMICAL MEASUREMENTS USING MAGNETIC RESONANCE IMAGING Read More »

ELECTRICAL APPLIANCE AND METHOD FOR SEPARATING AN ELECTRICAL APPLIANCE

Invented by Strobl; Matthias, Plechinger; Ekkehard, Reisinger; Jürgen, Amann; Martin The way we handle old electrical devices is changing. A new patent application shows how simple markings, like QR codes, can make taking apart electronic gadgets easier and safer. This article explains the background, the science behind it, and what makes this invention so special.

ELECTRICAL APPLIANCE AND METHOD FOR SEPARATING AN ELECTRICAL APPLIANCE Read More »

NETWORK FUNCTION FOR USE IN HANDLING THE CREATION OF APPLICATIONS FOR SUBSCRIBERS

Invented by BALDINI; Luca, PATRIA; Gaetano, DEBENEDETTI; Paolo, MASSINO; Davide, GAITO; Daniele, Telefonaktiebolaget LM Ericsson (publ) The world of connected devices is growing faster than ever. As we move into the era of 6G and the Internet of Things (IoT), the challenge is not just about speed or data. It’s about letting different devices and

NETWORK FUNCTION FOR USE IN HANDLING THE CREATION OF APPLICATIONS FOR SUBSCRIBERS Read More »

A METHOD FOR PROTECTING MODULAR EXPONENTIAL ALGORITHMS AGAINST DEEP-LEARNING SIDE-CHANNEL ATTACK (DL-SCA)

Invented by LI; Xun, VIGILANT; David, THALES DIS FRANCE SAS Today, digital devices use secrets like private keys to keep our data safe. But attackers are getting smarter, using things like deep learning to guess these secrets by simply watching how a device acts, such as how much power it uses or how long it

A METHOD FOR PROTECTING MODULAR EXPONENTIAL ALGORITHMS AGAINST DEEP-LEARNING SIDE-CHANNEL ATTACK (DL-SCA) Read More »