in:(Remy POTTIER)
DATA ACCESS AND OWNERSHIP MANAGEMENT
PCT/GB2016/052546
[POTTIER, Remy, POTTIER, Remy, MERIAC, Milosch, POTTIER, Remy, MERIAC, Milosch, CURTIS, William Allen, POTTIER, Remy, MERIAC, Milosch, CURTIS, William Allen, LUFF, Geraint]
110 Fulbourn RoadCambridge CB1 9NJ;110 Fulbourn RoadCambridge CB1 9NJ
In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL. In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
更多详情内容请
点击查看
A METHOD OF ESTABLISHING TRUST BETWEEN A DEVICE AND AN APPARATUS
PCT/GB2016/050148
[POTTIER, Remy, POTTIER, Remy, PHILLIPS, Amyas Edward Wykes, POTTIER, Remy, PHILLIPS, Amyas Edward Wykes, MERIAC, Milosch]
110 Fulbourn RoadCherry HintonCambridge CB1 9NJ;110 Fulbourn Road, Cherry HintonCambridge CB1 9NJ
There is disclosed a method of establishing trust between an agent device and a verification apparatus, the method comprising: obtaining, at the agent device, a trust credential, wherein the trust credential relates to an aspect of the agent device and comprises authentication information for identifying at least one party trusted by the verification apparatus and/or device data relating to the agent device; transmitting, from the agent device to the verification apparatus, the trust credential; obtaining, at the verification apparatus, the trust credential; analysing, at the verification apparatus, the trust credential; determining, at the verification apparatus, whether the agent device is trusted based on the analysis; and responsive to determining the agent device is trusted, establishing trust between the agent device and the verification apparatus.
更多详情内容请
点击查看
SEALED TRANSMISSION DEVICE USING METAL BELLOWS,SUITABLE FOR QUARTER-TURN VALVES
ZA8804699A
[POTTIER DANIEL, DANIEL POTTIER, LECLAIRE REMY, REMY LECLAIRE, VULLIEZ PAUL, PAUL VULLIEZ]
1. A sealed, rotary transmission device of bellows construction, comprising a control shaft (14) and a receiver shaft (20), of the type in which said bellows (26) surrounds said receiver shaft and is fixed in a sealed manner at both of its ends, at one end to a fixed part (28) of a casing and, at the other end, to a transfer member (32) constrained to move parallel to a plane perpendicular to said receiver shaft (20), characterised in that said control shaft (14) and said receiver shaft (20) are parallel, spaced apart by a distance (d) and disposed on either side of the transfer member (32), in that each shaft comprises a crank (14a, 20a) offset by the same predetermined distance (x) from its axis, and in that these two cranks are coupled to said transfer member (32) and are spaced by the same distance (d) as said shafts so as to allow a circular movement induced by said transfer member.
更多详情内容请
点击查看
SEALED TRANSMISSION DEVICE USING METAL BELLOWS,SUITABLE FOR QUARTER-TURN VALVES
ZA884699A
[POTTIER DANIEL, DANIEL POTTIER, LECLAIRE REMY, VULLIEZ PAUL, REMY LECLAIRE, PAUL VULLIEZ]
更多详情内容请
点击查看
MANAGEMENT OF RELATIONSHIPS BETWEEN A DEVICE AND A SERVICE PROVIDER
PCT/GB2015/053649
[TSCHOFENIG, Hannes, TSCHOFENIG, Hannes, POTTIER, Remy]
110 Fulbourn RoadCherry HintonCambridge CB1 9NJ;110 Fulbourn Road, Cherry HintonCambridge CB1 9NJ
An authentication device is used to create a secure connection between an Internet of Things (IoT) device and a service provider, so that the IoT device is not limited to only the services of one specific provider or the specific services of the provider of the IoT device. In addition, multiple IoT devices purchased from several different providers can all be connected to the same service provider.
更多详情内容请
点击查看
A METHOD OF ESTABLISHING TRUST BETWEEN A DEVICE AND AN APPARATUS
US15549505
[Remy POTTIER, Amyas Edward Wykes PHILLIPS, Milosch MERIAC]
GB Cambridge
There is disclosed a method of establishing trust between an agent device and a verification apparatus, the method comprising: obtaining, at the agent device, a trust credential, wherein the trust credential relates to an aspect of the agent device and comprises authentication information for identifying at least one party trusted by the verification apparatus and/or device data relating to the agent device; transmitting, from the agent device to the verification apparatus, the trust credential; obtaining, at the verification apparatus, the trust credential; analysing, at the verification apparatus, the trust credential; determining, at the verification apparatus, whether the agent device is trusted based on the analysis; and responsive to determining the agent device is trusted, establishing trust between the agent device and the verification apparatus.
更多详情内容请
点击查看
Technique for monitoring a battery cell
US17541000
[Emre Ozer, Remy Pottier, Jedrzej Kufel, John Philip Biggs, James Edward Myers]
GB Cambridge
A battery cell monitoring system comprises a flexible substrate able to conform to a surface of a battery cell to be monitored, and a plurality of first-level prediction units integrated onto the flexible substrate, where each first-level prediction unit is positioned at a different location on the flexible substrate to each other first-level prediction unit. Each first-level prediction unit comprises at least one sensor to generate sensor signals indicative of a physical state of the battery cell, and first-level prediction circuitry to generate a predicted battery cell status value in dependence on the sensor signals received from the at least one sensor of that first-level prediction unit. Second-level prediction circuitry is arranged to determine a prediction result in dependence on the predicted battery cell status values generated by the first-level prediction circuitry of each first-level prediction unit, and a communications device is used to output the prediction result at least when the prediction result indicates an occurrence of a critical event.
更多详情内容请
点击查看
TECHNIQUE FOR MONITORING A BATTERY CELL
US17541000
[Emre OZER, Remy POTTIER, Jedrzej KUFEL, John Philip BIGGS, James Edward MYERS]
GB Cambridge
A battery cell monitoring system comprises a flexible substrate able to conform to a surface of a battery cell to be monitored, and a plurality of first-level prediction units integrated onto the flexible substrate, where each first-level prediction unit is positioned at a different location on the flexible substrate to each other first-level prediction unit. Each first-level prediction unit comprises at least one sensor to generate sensor signals indicative of a physical state of the battery cell, and first-level prediction circuitry to generate a predicted battery cell status value in dependence on the sensor signals received from the at least one sensor of that first-level prediction unit. Second-level prediction circuitry is arranged to determine a prediction result in dependence on the predicted battery cell status values generated by the first-level prediction circuitry of each first-level prediction unit, and a communications device is used to output the prediction result at least when the prediction result indicates an occurrence of a critical event.
更多详情内容请
点击查看
APPARATUS AND METHODS FOR LOAD BALANCING ACROSS A NETWORK OF NODES
US15572692
[Christopher Mark PAOLA, Milosch MERIAC, Remy POTTIER]
GB Cambridge
A system provided at nodes within a network of nodes enabling the nodes to migrate activities to other nodes within its communication range to provide load balancing across the network. The other nodes having power and processing capabilities and capacity enabling them to undertake the migrated activities.
更多详情内容请
点击查看
Integrity monitoring for flexible material
US17543070
[Emre Ozer, Jedrzej Kufel, James Edward Myers, Remy Pottier, John Philip Biggs]
GB Cambridge
Wearable items and methods of monitoring wearable items are disclosed. The wearable item comprises a flexible base material forming at least a portion of the wearable item, plural conductive traces traversing the flexible base material, and conductivity sensing circuitry coupled to the plural conductive traces. The conductivity sensing circuitry is configured to distinguish conductivity from non-conductivity of the plural conductive traces, and configured to generate a conductivity indication for at least one of the plural conductive traces. The plural conductive traces follow indirect paths across the flexible base material, allowing the flexible material to flex and stretch normally without breaking the conductive traces.
更多详情内容请
点击查看