Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

222 results about "Computer configuration" patented technology

In communications or computer systems, a configuration of a system refers to the arrangement of each of its functional units, according to their nature, number and chief characteristics. Often, configuration pertains to the choice of hardware, software, firmware, and documentation. Along with its architecture, the configuration of a computer system affects both its function and performance.

System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning

The present invention provides a system and method for predicting and preventing unauthorized intrusion in a computer configuration. Preferably, the invention comprises a communication network to which at least two computing devices connect, wherein at least one of the computing devices is operable to receive data transmitted by the other computing device. The invention further comprises a database that is accessible over the network and operable to store information related to the network. A vulnerability assessment component is provided that is operable to execute a command over the communication network, and a data monitoring utility operates to monitor data transmitted over the communication network as the vulnerability assessment component executes commands. Also, an intrusion detection component is included that is operable to provide a simulated copy of the network, to generate a first data transmission on the simulated copy of the network that represents a second data transmission on the communication network, and to compare the first data transmission with a second data transmission. The vulnerability assessment component preferably interfaces with the intrusion detection component to define rules associated with the first and second data transmissions, to store the rules in the database, and to retrieve the rules from the database in order to predict and prevent unauthorized intrusion in the computer configuration.
Owner:PACE UNIVERSITY

Active marketing based on client computer configurations

A system and method for actively marketing products and services to a user of a client computer such as over a network are disclosed. A product information database comprising product summary files that facilitate determination of presence or absence of products associated with the client computer, a marketing rule knowledge base comprising opportunity rule files governing marketing opportunities, and an opportunity detection object for determination of marketing opportunities are utilized to determine active marketing opportunities and may be downloaded to the client computer from a service provider computer system. The opportunity detection object may comprise a scan engine, an opportunity analysis engine, and a presentation engine which collectively determine and present marketing information to the client computer user. The scan engine compares the client computer against the product information database to determine the configurations of the client computer and to generate a client computer inventory database. The opportunity analysis engine analyzes the client computer inventory database against the marketing rule knowledge base and generates a list of marketing opportunities for the client computer. The presentation engine analyzes the list of marketing opportunities and provides marketing and/or other information regarding marketed products to the user.
Owner:MCAFEE LLC

Active marketing based on client computer configurations

A system and method for actively marketing products and services to a user of a client computer such as over a network are disclosed. A product information database comprising product summary files that facilitate determination of presence or absence of products associated with the client computer, a marketing rule knowledge base comprising opportunity rule files governing marketing opportunities, and an opportunity detection object for determination of marketing opportunities are utilized to determine active marketing opportunities and may be downloaded to the client computer from a service provider computer system. The opportunity detection object may comprise a scan engine, an opportunity analysis engine, and a presentation engine which collectively determine and present marketing information to the client computer user. The scan engine compares the client computer against the product information database to determine the configurations of the client computer and to generate a client computer inventory database. The opportunity analysis engine analyzes the client computer inventory database against the marketing rule knowledge base and generates a list of marketing opportunities for the client computer. The presentation engine analyzes the list of marketing opportunities and provides marketing and/or other information regarding marketed products to the user.
Owner:MCAFEE LLC

Method and apparatus for verifying the contents of a global configuration file

A method and apparatus are provided for determining the validity of a global configuration file. In order to verify the global configuration file, the configuration file is first “flattened.” To flatten the configuration file, the rules in the first block of the configuration file are identified. A settings file is then created with the rules set as true. The normal configuration process is then performed on the configuration file. The resulting settings file constitute the flattened settings for the block and are associated with the block. A determination is then made as to whether any conflicting settings, inconsistently set related settings, or syntax errors exist within the flattened settings. If any such settings do exist, an error message is generated. This process is then repeated for each block in the configuration file so that flattened settings are created for each block. A testing block may also be utilized to identify problems with the settings file generate by the testing block. Reverse queries may also be performed on the settings file. Changes in the flattened configuration files caused by changes in the global configuration file can also be identified. The flattened files may also be used to simplify the server computer configuration process.
Owner:MICROSOFT TECH LICENSING LLC

Video editing method and apparatus

A computer video editing system and method in a network of computers is disclosed. The system and method include a datastore or other source of subject video data, a transcription module and an assembly member. The transcription module generates a working transcript of the corresponding audio data of subject source video data. The working transcript includes original source video time coding for the passages (statements) forming the transcript. The assembly member enables user selection and ordering of transcript portions. For each user selected transcript portion, the assembly member, in real-time, (i) obtains the respective corresponding source video data portion and (ii) combines the obtained video data portions to form a resulting video work. The resulting video work is displayed to users and may be displayed simultaneously with display of the whole original working transcript to enable further editing and/or user comment. A text script of the resulting video work is also displayed. The video editing system and method may be implemented in a local area network of computers, as a browser based application on a host in a global computer network, as well as on stand alone computer configurations with a remote or integrated transcription service. The subject video data may be from a video blog, email, a user discussion thread or other user forum based on a computer network.
Owner:PORTALVIDEO

Method for modifying computer configuration and configuration of program which operates on computer, and computing device and system for implementing the method

This invention relates to modifying hardware and program configuration of a computer. In one embodiment, a computer configuration modification method comprises, upon reception of a configuration modification request for the hardware configuration and program configuration of the computer to be modified, transmitting the information regarding the hardware configuration to be modified to a hardware contract renewal notification destination in order to modify the fee to be paid for the modified hardware, and transmitting the information regarding the hardware configuration to be modified and the information regarding the program configuration to be modified to a program contract renewal notification destination in order to modify the fee to be paid for the modified program. When license information transmitted from the program contract renewal notification destination is inputted, the hardware configuration is modified based on the information regarding the hardware configuration to be modified and the program configuration is modified based on the information regarding the hardware configuration to be modified and the information regarding the program configuration to be modified.
Owner:HITACHI LTD

System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning

The present invention provides a system and method for predicting and preventing unauthorized intrusion in a computer configuration. Preferably, the invention comprises a communication network to which at least two computing devices connect, wherein at least one of the computing devices is operable to receive data transmitted by the other computing device. The invention further comprises a database that is accessible over the network and operable to store information related to the network. A vulnerability assessment component is provided that is operable to execute a command over the communication network, and a data monitoring utility operates to monitor data transmitted over the communication network as the vulnerability assessment component executes commands. Also, an intrusion detection component is included that is operable to provide a simulated copy of the network, to generate a first data transmission on the simulated copy of the network that represents a second data transmission on the communication network, and to compare the first data transmission with a second data transmission. The vulnerability assessment component preferably interfaces with the intrusion detection component to define rules associated with the first and second data transmissions, to store the rules in the database, and to retrieve the rules from the database in order to predict and prevent unauthorized intrusion in the computer configuration.
Owner:PACE UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products