Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

306 results about "Destination site" patented technology

A destination site is a website with an assortment of content and jumping off points, intended to serve as a portal to the web for its users. Companies design such sites with the goal of making them the first stop for users interested in a particular topic or range of topics, and government agencies can use similar site designs.

System and method for installing an auditable secure network

A system and method for generating and remotely installing a private secure and auditable network is provided. Node identification, link, and application information is input into a template. A generator generates components using the information in the template and the components are remotely installed using an installation server. The components include agent modules which are each installed at predetermined target site and establish communication with the installation server to facilitate the download of other components, including application software and configuration files. Each node can only be installed once and is specific to a predetermined target site. For each link, a unique pair of keys is generated in a form which is not human readable, each key corresponds to a different direction of communication over the link. Data transmitted between nodes is encrypted using public-private key pairs. At least one monitor node manages the security of the network, strobes keys, and may take nodes out of the network in the event of a security violation. In such a case, one or more nodes, or the entire network, may be regenerated and installed anew. Throughout the generation and installation a plurality of verifications, authorizations, and password entries may be required by independent groups to arrive at the network. Preferably, the installation is audited by several groups, and the overall operation may be audited by a second monitor node to detect the presence of an interposed “pirate” node.
Owner:ANGEL SECURE NETWORKS

Method for Inter-Site Data Stream Transfer in a Cooperative Data Stream Processing

A cooperative data stream processing system is provided that utilizes a plurality of independent, autonomous and potentially heterogeneous sites in a cooperative arrangement to process user-defined inquiries over dynamic, continuous streams of data. The system derives jobs from the inquiries and these jobs are executed on the various distributed sites by executing applications containing processing elements on these sites. Therefore, components of a given job can be executed simultaneously and in parallel on a plurality of sites within in the system. The sites associated with a given job execution have the need to share data, both primal and derived. A tunnel mechanism is provided that establishes tunnels between pairs of sites within the system. Each tunnel includes either a sink processing element on an originating site and a source processing element on a destination site or a gateway processing element on each site and a network connection between the sink and source processing elements. The sink and source processing elements are in communication with application processing elements on their respective sites and facilitate the exchange of data between these application processing elements. Tunnels can be establish on demand or in accordance with a prescribed plan and can be job specific of generic to any job executing on a given pair of sites.
Owner:IBM CORP

Installation for harvesting ocean currents (IHOC) and methods and means for its delivery, installation and servicing

Installation for harvesting energy of ocean currents (IHOC) in deepwaters is based on utilization of a semisubmersible platform and the multiple of vertically oriented Darrieus type hydraulic turbines. The turbines are located as close as possible to ocean surface, where speed of current is usually at its maximum. Since speed of current fluctuate during the seasons a system controlling buoyancy force of that keeps IHOC floating near surface is employed. The mooring system consists of three tethers, which prevent transferring of overturning moment applied to IHOC to anchoring base. The electric power generators are located in a machinery room on a structure well above sea level and would transmit electric power to the shore utilizing flexible cable. During hurricane it will be lowered to the depth preventing turbines from being affected by wave actions, at the same time it would keep machinery room above wave action. For the purpose of delivery assembled on shore Turbine Housing to destination site and installing it there a special convoy is formed consisting of Catamaran Delivery Barge and Stabilizing Platform.
The second Embodiment of this invention is designed to harvest energy of tides in deepwaters.
Owner:BELINSKY SIDNEY IRVING +1

Public transport vehicle arrival time prediction method based on history data

ActiveCN104064024AOvercome the problem of not being able to locate long distancesAccurate acquisition in real timeRoad vehicles traffic controlInformation dataPublic transport
A public transport vehicle arrival time prediction method based on history data comprises the following steps: a)receiving GPS real-time data uploaded by a GPS device on a public transport vehicle and vehicle arrival information data in real time; b) processing the GPS real-time data after the GPS real-time data of the vehicle is obtained successfully; and c) after the vehicle arrival information is obtained successfully, searching station devices to send information from on-line station devices according to the line serial number and the running direction in the vehicle arrival information and obtaining the closet vehicle distance of a target station; and through obtaining the history data and today's data of the running speed of a vehicle between adjacent stations on the line at set time running period, by utilizing a weighted average method to estimate the average running speed of the vehicle between the adjacent stations on the current line and at the current time period, and on the basis of the bypassed inter-station distances and inter-station average running speed of the vehicle running to the station, each inter-station running time of the vehicle can be estimated, and the vehicle arrival time can be predicted jointly. With the method, the prediction distance is long, the real-time performance is good and the accuracy is good.
Owner:ENJOYOR COMPANY LIMITED

System and method for customizing a portal environment

A system and method for creating a customized portal environment website that retrieves content from external websites and presents this content with a consistent and controlled look and feel. Three features of this invention that enable the consistent look and feel are clipping, scrubbing and link behavior tools. The clipping tool identifies the structure of clipped pages. The structure of the clipped content is stored in a database in the system. As the system dynamically retrieves clipped pages from the target site, the system compares the structure of the retrieved clip to the anticipated, stored structure of the clip. If the two structures match, the clipped page is rendered in the look and feel of the custom website. If the structures do not match, the dynamically clipped page is displayed in a new separate window. The scrubbing feature of the present invention allows the designer of the website to define a global structure for all pages that are retrieved from a particular domain. If a requested page does not conform to the defined structure, the system opens a new window for the page. The link behavior tool of the present invention traps a request for the embedded link upon it's execution and redirecting the request to a page that has already been approved and clipped or by opening a new window for the embedded link.
Owner:JPMORGAN CHASE BANK NA

Concealed communication method

InactiveCN104917747ATransmission reachedLarge capacityTransmissionData packAlgorithm
The invention discloses a concealed communication method. The method comprises the following steps that encryption is performed on first original data on a sending end and a receiving end so as to form concealed information and generate a binary sequence of the concealed information, and the binary sequence is recorded as a sending-end original cipher; the binary sequence of the concealed information is converted into a sending-end Chinese character sequence and is sent to the receiving end; the receiving end receives the concealed information and carries out decryption. Through the above mode, by using the concealed communication method provided in the invention, a Chinese character coding is used to embed the concealed communication into a Chinese character; through analyzing the concealed information which needs to be transmitted, the concealed information is converted into English letters in a split-up mode and then are converted into a Chinese character; then the Chinese character is transmitted to a target site through forms of a mail, a webpage and a picture so that a purpose of transmitting the concealed information is reached. A concealed channel established by using the method possesses advantages of a high capacity and high concealed performance. In the method, the concealed information is packed and transmitted in a data portion of an IP data packet.
Owner:SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products