Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4040results about "Electric/magnetic computing" patented technology

System, method, and computer program product for providing location based services and mobile e-commerce

A system, method, apparatus and computer program product for providing location based functions and mobile e-commerce comprising a central processing unit including a processor, a storage device, and programming stored in the storage device, a display device, an audio input device, an audio output device, a communications module, a commerce module, an image module, and a location module. The programming controls the operation of the present invention to provide functions based on location data, to facilitate commercial exchanges by wirelessly exchanging payment and product information with venders, to identify services such as venders meeting selection criteria, to wirelessly exchange select information with other users and systems, to restrict and / or monitor the use of the device based on authorized user parameters, selecting one of a plurality networks through which to communicate, detecting a trigger for performing an action based on a change in location and sensed data, storing a voice annotation with a computer data file, determining service providers and associated communication parameters, contemporaneously maintaining a wireless voice and data link, providing a system for selecting and delivering mobile advertisements, and many other functions and services that are described herein.
Owner:GULA CONSULTING LLC

Structured methodology and design patterns for web services

System and method for designing and implementing Web Services according to a structured methodology and design patterns. Embodiments may incorporate a structured methodology, best practices and design patterns that address reliability, availability and scalability of Web Services architecture. Embodiments may provide mechanisms for integrating heterogeneous technology components into Web Services. Embodiments may provide a vendor-independent Web Services architecture framework and reusable Web Services design patterns, which may be used in creating end-to-end solutions based on past experience and best practices. Embodiments may include design patterns and best practices for delivering Web Services solutions with Quality of Services. One embodiment may provide a Business-to-Business Integration (B2Bi) integration framework for Web Services. Embodiments may provide a Web Security framework and design patterns for designing end-to-end Web Services security.
Owner:ORACLE INT CORP

System and method for vehicle diagnostics

Method and system for diagnosing whether vehicular components are operating abnormally based on data obtained from sensors arranged on a vehicle. In a training stage, output from the sensors during normal operation of the components is obtained, each component is adjusted to induce abnormal operation thereof and output from the sensors is obtained during the induced abnormal operation. A determination is made as to which sensors provide data about abnormal operation of each component based on analysis of the output from the sensors during normal operation and during induced abnormal operation of the components. During operation of the vehicle, the output from the sensors is obtained and analyzed, e.g., by inputting it into a pattern recognition algorithm or neural network generated during the training stage, in order to output an indication of abnormal operation of any components being diagnosed.
Owner:AMERICAN VEHICULAR SCI

Predictive modeling of consumer financial behavior using supervised segmentation and nearest-neighbor matching

Predictive modeling of consumer financial behavior, including determination of likely responses to particular marketing efforts, is provided by application of consumer transaction data to predictive models associated with merchant segments. The merchant segments are derived from the consumer transaction data based on co-occurrences of merchants in sequences of transactions. Merchant vectors represent specific merchants, and are aligned in a vector space as a function of the degree to which the merchants co-occur more or less frequently than expected. Consumer vectors are developed within the vector space, to represent interests of particular consumers by virtue of relative vector positions of consumer and merchant vectors. Various techniques, including clustering, supervised segmentation, and nearest-neighbor analysis, are applied separately or in combination to generate improved predictions of consumer behavior.
Owner:CALLAHAN CELLULAR L L C

System, method, and computer program product for providing location based services and mobile e-commerce

A system, method, apparatus and computer program product for providing location based functions and mobile e-commerce comprising a central processing unit including a processor, a storage device, and programming stored in the storage device, a display device, an audio input device, an audio output device, a communications module, a commerce module, an image module, and a location module. The programming controls the operation of the present invention to provide functions based on location data, to facilitate commercial exchanges by wirelessly exchanging payment and product information with venders, to identify services such as venders meeting selection criteria, to wirelessly exchange select information with other users and systems, to restrict and / or monitor the use of the device based on authorized user parameters, selecting one of a plurality networks through which to communicate, detecting a trigger for performing an action based on a change in location and sensed data, storing a voice annotation with a computer data file, determining service providers and associated communication parameters, contemporaneously maintaining a wireless voice and data link, providing a system for selecting and delivering mobile advertisements, and many other functions and services that are described herein.
Owner:GULA CONSULTING LLC

Method and System for Coordinating Transportation Service

A method and system for coordinating transportation service is provided. A request is received for a trip generated by a client application executing on a mobile device. Which one of a set of transportation vehicles is best suited to provide the trip is determined. The one transportation vehicle to provide the trip is automatically dispatched.
Owner:JULIVER STEVEN +2

Mental Model Elicitation Device (MMED) Methods and Apparatus

A mental-model elicitation process and apparatus, called the Mental-Model Elicitation Device (MMED) is described. The MMED is used to give rise to more effective end-user mental-modeling activities that require executive function and working memory functionality. The method and apparatus is visual analysis based, allowing visual and other sensory representations to be given to thoughts, attitudes, and interpretations of a user about a given visualization of a mental-model, or aggregations of such visualizations and their respective blending. Other configurations of the apparatus and steps of the process may be created without departing from the spirit of the invention as disclosed.
Owner:DURHAM JAYSON THEORDORE

System and method for capture of user actions and use of capture data in business processes

Systems and methods are disclosed for capturing data representative of user interactions with a desktop computer, and processing the capture data to identify and analyze business processes performed by the user. The disclosed system comprises listeners that capture key actuations, mouse-clicks, screen information, and other data representative of user interaction with a desktop computer. A desktop observer is provided to accept capture data from listeners, to temporarily store the capture data if necessary, and to pass the capture data to a process intelligence server. The process intelligence server includes a process discovery module the analyzes the capture data and identifies business processes corresponding to the capture data, or models business processes. A process data master storage is provided. A process analysis module is provided to determine performance metrics, best practices, application productivity impacts, compliance, and optimization analysis on the data stored in the process master storage. Methods are disclosed for capture, catalog, combination, correlation, change, compression, and certification.
Owner:QLIP MEDIA

Process and system for retrieval of documents using context-relevant semantic profiles

A process and system for database storage and retrieval are described along with methods for obtaining semantic profiles from a training text corpus, i.e., text of known relevance, a method for using the training to guide context-relevant document retrieval, and a method for limiting the range of documents that need to be searched after a query. A neural network is used to extract semantic profiles from text corpus. A new set of documents, such as world wide web pages obtained from the Internet, is then submitted for processing to the same neural network, which computes a semantic profile representation for these pages using the semantic relations learned from profiling the training documents. These semantic profiles are then organized into clusters in order to minimize the time required to answer a query. When a user queries the database, i.e., the set of documents, his or her query is similarly transformed into a semantic profile and compared with the semantic profiles of each cluster of documents. The query profile is then compared with each of the documents in that cluster. Documents with the closest weighted match to the query are returned as search results.
Owner:DTI OF WASHINGTON

Monitoring system for determining and communicating a cost of insurance

A method and system for communicating insurance related services between an insured and an insurer through an Internet communication scheme includes a processing system for processing acquired event and sensored data to compute the cost of insurance for the same period as the data is acquired. An enhanced Internet communication scheme provides an insured access to the acquired data and its processing through enhanced presentation systems (e.g., maps with usage, service or special event processing or even automobile service diagnostics.) In addition, communication packages can provide estimates based upon user-supplied information identifying projected usages.
Owner:PROGRESSIVE CASUALTY INSURANCE

Neural network drug dosage estimation

Neural networks are constructed (programmed), trained on historical data, and used to predict any of (1) optimal patient dosage of a single drug, (2) optimal patient dosage of one drug in respect of the patient's concurrent usage of another drug, (3a) optimal patient drug dosage in respect of diverse patient characteristics, (3b) sensitivity of recommended patient drug dosage to the patient characteristics, (4a) expected outcome versus patient drug dosage, (4b) sensitivity of the expected outcome to variant drug dosage(s), (5) expected outcome(s) from drug dosage(s) other than the projected optimal dosage. Both human and economic costs of both optimal and sub-optimal drug therapies may be extrapolated from the exercise of various optimized and trained neural networks. Heretofore little recognized sensitivities-such as, for example, patient race in the administration of psychotropic drugs-are made manifest. Individual prescribing physicians employing deviant patterns of drug therapy may be recognized. Although not intended to prescribe drugs, nor even to set prescription drug dosage, the neural networks are very sophisticated and authoritative "helps" to physicians, and to physician reviewers, in answering "what if" questions.
Owner:PREDICTION SCI

Image acquisition and processing methods for automatic vehicular exterior lighting control

The present invention relates to various apparatus, algorithms and methods for acquiring and processing images of a scene. Details of various aspects of the associated images are identified and may be utilized to generate various vehicular equipment control signals.
Owner:GENTEX CORP

Task computing

A computer-based system includes task computing enabling users to define tasks by combining available functionality and to execute such tasks. The computer-based system of includes available functionality which originates in devices, computing applications and electronic services available through local and remote procedure calls including Web Services, UPnP, CORBA, RMI, RPC, DCE, DCOM or comprises previously defined tasks. All available functionality is abstracted to the user as a service and each service is expressed in a service description language, and the services have a semantic description associated with them.
Owner:FUJITSU LTD

Method and system for exploring similarities

A method and computer readable medium for exploring similar users and items of a media service. In one aspect, a user can explore for similar users iteratively. In one aspect, a user interface is generated that displays a user selectable indicia representing a similar member function for allowing a user to search a media service for at least one other user which has a degree of similarity with respect to the searching user. In another aspect, a method facilitates the search of such a similar user within a media service.
Owner:HUAWEI TECH CO LTD

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Bidding for energy supply

An auction service is provided that stimulates competition between energy suppliers (i.e., electric power or natural gas). A bidding moderator (Moderator) receives bids from the competing suppliers of the rate each is willing to charge to particular end users for estimated quantities of electric power or gas supply (separate auctions). Each supplier receives competing bids from the Moderator and has the opportunity to adjust its own bids down or up, depending on whether it wants to encourage or discourage additional energy delivery commitments in a particular geographic area or to a particular customer group. Each supplier's bids can also be changed to reflect each supplier's capacity utilization. Appropriate billing arrangements are also disclosed.
Owner:GEOPHONIC NETWORKS

Dynamic message filtering

Dynamically filtering and classifying messages, as good messages, bulk periodicals, or spam. A regular expression recognizer, and pre-trained neural networks. The neural networks distinguish “likely good” from “likely spam,” and also operate at a more discriminating level to distinguish among the three categories above. A dynamic whitelist and blacklist; sending addresses are collected when the number of their messages indicates the sender is good or a spammer. A dynamically selected set of regular expressions input to the neural networks.
Owner:MAILGATE LLC

Dynamic pricing system and method for complex energy securities

InactiveUS20110040666A1FinanceDigital computer detailsComputational securityCommunication interface
A dynamic pricing system for complex energy securities, comprising a communications interface executing on a network-connected server and adapted to receive information from a plurality of iNodes, an event database coupled to the communications interface and adapted to receive events from a plurality of iNodes via the communications interface, a pricing server coupled to the communications interface, and a statistics server coupled to the event database and the pricing server, is disclosed. According to the invention, the pricing server, on receiving a request to establish a price for an energy security, requests at least one statistical indicia of risk from the statistics server, the statistical indicia of risk being computed by the statistics server based on a plurality of historical data obtained from the event database, and the pricing server computes a price for the security based at least in part on the statistical indicia of risk.
Owner:CRABTREE JASON +3

Managing controlled content on a web page having revenue-generating code

Managing controlled content on a web page is disclosed. A web page is analyzed. Controlled content and revenue-generating code are detected on the web page. A party to contact is determined based on the revenue-generating code or the controlled content.
Owner:ATTRIBUTOR CORP

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Method of Operating a Multiport Vehicle Charging System

A method of distributing charging power among a plurality of charge ports of a battery charging station is provided, where the battery charging station includes a plurality of power stages where each power stage includes an AC to DC converter and provides a portion of the charging station's maximum available charging power, the method comprising the steps of (i) monitoring battery charging station conditions and operating conditions for each charging port; (ii) determining current battery charging station conditions, including current operating conditions for each charging port; (iii) determining power distribution for the battery charging station and the charging ports in response to the current battery charging conditions and in accordance with a predefined set of power distribution rules; and (iv) coupling the power stages to the charging ports in accordance with the power distribution.
Owner:TESLA INC

Multi-tier service level agreement method and system

A method for managing multi-tier SLA relationships. The method can include first computing costs of utilizing edge server resources in a CDN, costs of dedicating content host resources in a content host in lieu of the utilization, and prospective revenues which can be generated by the content host providing services based on the resources to content consumers. Minimum QoS levels can be identified which must be maintained when providing the services to the content consumers according to QoS terms in established SLAs between the content host and individual ones of the content consumers. Finally, a new SLA can be established between the content host and the CDN. Importantly, the new SLA can include QoS terms for selectively allocating resources in the CDN. Moreover, the QoS terms can optimize revenues generated by the content host providing services based on the selective allocation of resources and the computed costs.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products