Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

6490 results about "Information data" patented technology

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. It is acceptable for data to be used as a singular subject or a plural subject.

Runtime adaptable search processor

ActiveUS20060136570A1Reduce stacking processImproving host CPU performanceWeb data indexingMultiple digital computer combinationsData packInternal memory
A runtime adaptable search processor is disclosed. The search processor provides high speed content search capability to meet the performance need of network line rates growing to 1 Gbps, 10 Gbps and higher. he search processor provides a unique combination of NFA and DFA based search engines that can process incoming data in parallel to perform the search against the specific rules programmed in the search engines. The processor architecture also provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and/or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

System and method for using global location information, 2d and 3D mapping, social media, and user behavior and information for a consumer feedback social media analytics platform for providing analytic measfurements data of online consumer feedback for global brand products or services of past, present, or future customers, users or target markets

InactiveUS20130073336A1Improved and desired customer perceptionImproved and desired and sentimentMarketingComputerized systemSocial media analytics
A method, apparatus, non-transitory computer readable storage medium, computer system, network, or system, is provided for using location information, 2D and 3D mapping, social media, and user behavior and information to provide alternative a consumer feedback social media analytics platforms for providing analytic measurements data of online consumer feedback for global brand products or services of past, present or future customers, users, and/or target markets, for companies, organizations, government agencies, and the like, by electronically collecting and analyzing, on a networked computer system using a processor, qualitative or quantitative online social media online communications, activity, and online communications and activity relevant to consumer products or services, or promotions thereof, of interest, in order to provide targeted, location based, 2D or 3D mapped, or impressions to generate online location information data or promotions to provide improved or desired customer perception or sentiment regarding a company's products, services or promotions thereof
Owner:HEATH STEPHAN

Passive biometric customer identification and tracking system

A computer-based customer tracking system uses a passive biometric identification for identifying customers. Neither the customer, nor any establishment personnel, are required to enter any informational data with respect to the customer; identification is done completely biometrically. Biometric identification information is sent to a central computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library, assigning a code or identification number to the file. Information with respect to the customer's biometric data, along with any transactional information, are stored in the file. If prior activity information stored in the file exceeds a predetermined level, information with respect to the customer's prior activity is retrieved from the file and sent to a terminal, preferably at the location of the transaction. Any new information from the transaction is then sent to the processor and stored for future access. The processor scans the files periodically, and deletes files for which the activity level in the file is below a certain predetermined level over a preselected time period. Deletion of inactive files precludes the processor memory from being overloaded with information which is not useful to the establishment, and also reduces the amount of time necessary for the processor to search library files for biometric matches.
Owner:BIOMETRIC RECOGNITION

Runtime adaptable security processor

A runtime adaptable security processor is disclosed. The processor architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and/or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. A scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

Data aggregation server for managing a multi-dimensional database and database management system having data aggregation server integrated therein

Improved method of and apparatus for aggregating data elements in multidimensional databases (MDDB). In one aspect of the present invention, the apparatus is realized in the form of a high-performance stand-alone (i.e. external) aggregation server which can be plugged-into conventional OLAP systems to achieve significant improments in system performance. In accordance with the principles of the present invention, the stand-alone aggregation server contains a scalable MDDB and a high-performance aggregation engine that are integrated into the modular architecture of the aggregation server. The stand-alone aggregation server of the present invention can uniformly distribute data elements among a plurality of processors, for balanced loading and processing, and therefore is highly scalable. The stand-alone aggregation server of the present invention can be used to realize (i) an improved MDDB for supporting on-line analytical processing (OLAP) operations, (ii) an improved Internet URL Directory for supporting on-line information searching operations by Web-enabled client machines, as well as (iii) diverse types of MDDB-based systems for supporting real-time control of processes in response to complex states of information reflected in the MDDB. In another aspect of the present invention, the apparatus is integrated within a database management system (DBMS). The improved DBMS can be used to realize achieving a significant increase in system performance (e.g. deceased access/search time), user flexibility and ease of use. The improved DBMS system of the present invention can be used to realize an improved Data Warehouse for supporting on-line analytical processing (OLAP) operations or to realize an improved informational database system, operational database system, or the like.
Owner:YANICKLO TECH LIABILITY +1

Systems and methods for electronically verifying and processing information

A computer implemented method and system which provides current, reliable and accurate personal information regarding a prospective borrower and/or co-borrower. The system includes a central server which receives requests for personal information relating to proposed borrowers, which in turn parses out similar requests relating to that borrower to information sources such as, among others, the Internal Revenue Service, the Social Security Administration, the Daily Banking System and the pertinent credit bureaus. Information corresponding to the respective requests is retrieved from the information sources, and then compiled into a report format and forwarded to the requested party. The requested party may be the borrower/consumer individually, or may be a mortgage broker/agent, lending institution or other party authorized to request and obtain the information. An electronic signature or signatures accompany the request to the central server, which uses same to retrieve personal information data pertaining to the signatory(ies). Various encryption schemes may be employed for security purposes. The invention permits for the retrieval, compilation and reporting of relevant, personal data to a party or parties involved in the loan decision making process without any opportunity for the information to be tampered with by the proposed borrower(s) because the information is obtained electronically and directly from the information depositories.
Owner:GREEN GERALD M +1

Secure online music distribution system

A secure music distribution system securely distributes digital products such as music, video, and/or computer software along with related media over a public telecommunications network, such as the Internet, employing a client-server architecture. The digital products are stored and controlled by a content manager computer system and are sold by separate merchant computer systems. The secure music distribution system includes a music distribution center which operates with any number of client systems and with any number of merchant systems. The music distribution center includes a content manager and at least one delivery server. The content manager maintains a media information database, a master media file system, and a transaction database. In addition, the music distribution center interfaces with a media licensing center, which in turn communicates with one or more distributed rights agent servers and the merchant servers. The merchant server executes in a merchant computer system, which also includes an HTTP (HyperText Transfer Protocol) server. The merchant servers interface with various payment processing systems. The client systems include a media player and a Web browser. Additional delivery servers and media licensing centers operate independently and externally to the music distribution center and interface with the music distribution center.
Owner:MICROSOFT TECH LICENSING LLC

Dynamic group formation for social interaction

A system and method that facilitates dynamic group formation for social interaction and/or real-time sharing of content with the group is provided. A group formation system includes a user interface component that facilitates a user's entry of information and display of information regarding group formation. For example, the user interface component can be employed, for example, with a mobile communication device such as a mobile phone, personal digital assistant (PDA), a smart phone, a small, web based mobile or a wireless application protocol (WAP) client, and/or a regular web client. The system can further include a group formation component that forms a group based, at least in part, upon information received from a user via the interface component. The group configuration component can further store information regarding groups (e.g., a name/identifier, member(s), event(s) and/or shared context associated with the group) in a group information data store. For example, the group configuration component can form a group based, at least in part, upon information stored in the group information data store (implicit group formation). The group information data store can, optionally, provide archival access to communications and/or shared content (e.g., through a mobile communications device and/or a PC-based web browser).
Owner:MICROSOFT TECH LICENSING LLC

Active marketing based on client computer configurations

A system and method for actively marketing products and services to a user of a client computer such as over a network are disclosed. A product information database comprising product summary files that facilitate determination of presence or absence of products associated with the client computer, a marketing rule knowledge base comprising opportunity rule files governing marketing opportunities, and an opportunity detection object for determination of marketing opportunities are utilized to determine active marketing opportunities and may be downloaded to the client computer from a service provider computer system. The opportunity detection object may comprise a scan engine, an opportunity analysis engine, and a presentation engine which collectively determine and present marketing information to the client computer user. The scan engine compares the client computer against the product information database to determine the configurations of the client computer and to generate a client computer inventory database. The opportunity analysis engine analyzes the client computer inventory database against the marketing rule knowledge base and generates a list of marketing opportunities for the client computer. The presentation engine analyzes the list of marketing opportunities and provides marketing and/or other information regarding marketed products to the user.
Owner:MCAFEE LLC

Dynamic personalization method of creating personalized user profiles for searching a database of information

A method for creating a personal profile of a user for searching a database comprises the following steps: (a) words or words linked to graphical elements are presented as choices to a user in a display; (b) each word is associated with other keywords or default words; (c) if a profile of the user has previously been established, the profile is referenced for previous added keywords or associative words; (d) search phrases are made from selected keywords or associative words added to the profile; (e) the search phrases are sent as search queries to search for objects in the database; (f) the objects returned from the search are presented to the user as a new display of choices; (g) when a user selects an object, the words that were used to search for that object are added to the user's profile, or reinforced if already present; and the steps (d) to (g) above are repeated iteratively. The user profiling method is preferably employed with a standard browser while the user visits websites or portals on the Internet which are structured with site word maps to implement the keyword references. The user profile can then be used to identify the user's preferences for items of interest on websites visited by the user.
Owner:SEASEER R&D
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products