Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

12884 results about "Information data" patented technology

In computing, data is information that has been translated into a form that is efficient for movement or processing. Relative to today's computers and transmission media, data is information converted into binary digital form. It is acceptable for data to be used as a singular subject or a plural subject.

System and method for promoting commerce, including sales agent assisted commerce, in a networked economy

A personal communication and electronic commerce system for use by participating users and participating merchants in connection with incentive programs in the Network Economy. The system includes a cellular communication network that includes geographically spaced base stations that are linked to a fixed communication network. Users may have personal communication devices that can be used to allow a digital message generated on the personal communication devices by placing a call through one of the base stations and memory for storing a digital value corresponding to a monetary value. The personal communication device may also be used as a cellular position locator to determine one's geographic location and, if desired, to access information from a merchant information database containing information pertaining to a plurality of participating merchants located within the geographic territory covered by the cellular communication network. The merchant information may be stored on a database that is accessible by merchants so those merchants can add, delete or alter information contained in their respective listings. An incentive system is also provided for creating incentives for participating users to encourage. This computer implemented incentive program for encouraging certain participant actions includes a first reward program under which participants may earn points for certain actions and a second reward program through which the redemption rate associated with a particular participant is adjusted in response to certain participant action. The incentive program has a wide range of applications, including transportation, financial services and computer gaming.
Owner:BEDNAREK MICHAEL DAVID

Runtime adaptable search processor

ActiveUS20060136570A1Reduce stacking processImproving host CPU performanceWeb data indexingMultiple digital computer combinationsData packInternal memory
A runtime adaptable search processor is disclosed. The search processor provides high speed content search capability to meet the performance need of network line rates growing to 1 Gbps, 10 Gbps and higher. he search processor provides a unique combination of NFA and DFA based search engines that can process incoming data in parallel to perform the search against the specific rules programmed in the search engines. The processor architecture also provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and/or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

Method and system for rating patents and other intangible assets

A statistical patent rating method and system is provided for independently assessing the relative breadth ("B"), defensibility ("D") and commercial relevance ("R") of individual patent assets and other intangible intellectual property assets. The invention provides new and valuable information that can be used by patent valuation experts, investment advisors, economists and others to help guide future patent investment decisions, licensing programs, patent appraisals, tax valuations, transfer pricing, economic forecasting and planning, and even mediation and / or settlement of patent litigation lawsuits. In one embodiment the invention provides a statistically-based patent rating method and system whereby relative ratings or rankings are generated using a database of patent information by identifying and comparing various characteristics of each individual patent to a statistically determined distribution of the same characteristics within a given patent population. For example, a first population of patents having a known relatively high intrinsic value or quality (e.g. successfully litigated patents) is compared to a second population of patents having a known relatively low intrinsic value or quality (e.g. unsuccessfully litigated patents). Based on a statistical comparison of the two populations, certain characteristics are identified as being more prevalent or more pronounced in one population group or the other to a statistically significant degree. Multiple such statistical comparisons are used to construct and optimize a computer model or computer algorithm that can then be used to predict and / or provide statistically-accurate probabilities of a desired value or quality being present or a future event occurring, given the identified characteristics of an individual patent or group of patents.
Owner:PATENTRATINGS

System and method for using global location information, 2d and 3D mapping, social media, and user behavior and information for a consumer feedback social media analytics platform for providing analytic measfurements data of online consumer feedback for global brand products or services of past, present, or future customers, users or target markets

InactiveUS20130073336A1Improved and desired customer perceptionImproved and desired and sentimentMarketingComputerized systemSocial media analytics
A method, apparatus, non-transitory computer readable storage medium, computer system, network, or system, is provided for using location information, 2D and 3D mapping, social media, and user behavior and information to provide alternative a consumer feedback social media analytics platforms for providing analytic measurements data of online consumer feedback for global brand products or services of past, present or future customers, users, and/or target markets, for companies, organizations, government agencies, and the like, by electronically collecting and analyzing, on a networked computer system using a processor, qualitative or quantitative online social media online communications, activity, and online communications and activity relevant to consumer products or services, or promotions thereof, of interest, in order to provide targeted, location based, 2D or 3D mapped, or impressions to generate online location information data or promotions to provide improved or desired customer perception or sentiment regarding a company's products, services or promotions thereof
Owner:HEATH STEPHAN

Passive biometric customer identification and tracking system

A computer-based customer tracking system uses a passive biometric identification for identifying customers. Neither the customer, nor any establishment personnel, are required to enter any informational data with respect to the customer; identification is done completely biometrically. Biometric identification information is sent to a central computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library, assigning a code or identification number to the file. Information with respect to the customer's biometric data, along with any transactional information, are stored in the file. If prior activity information stored in the file exceeds a predetermined level, information with respect to the customer's prior activity is retrieved from the file and sent to a terminal, preferably at the location of the transaction. Any new information from the transaction is then sent to the processor and stored for future access. The processor scans the files periodically, and deletes files for which the activity level in the file is below a certain predetermined level over a preselected time period. Deletion of inactive files precludes the processor memory from being overloaded with information which is not useful to the establishment, and also reduces the amount of time necessary for the processor to search library files for biometric matches.
Owner:BIOMETRIC RECOGNITION

Runtime adaptable search processor

A runtime adaptable search processor is disclosed. The search processor provides high speed content search capability to meet the performance need of network line rates growing to 1 Gbps, 10 Gbps and higher. The search processor provides a unique combination of NFA and DFA based search engines that can process incoming data in parallel to perform the search against the specific rules programmed in the search engines. The processor architecture also provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and / or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and / or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. Scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to / from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

Runtime adaptable security processor

A runtime adaptable security processor is disclosed. The processor architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and/or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. A scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

System and method for promoting commerce, including sales agent assisted commerce, in a networked economy

A personal communication and electronic commerce system for use by participating users and participating merchants in connection with incentive programs in the Network Economy. The system includes a cellular communication network that includes geographically spaced base stations that are linked to a fixed communication network. Users may have personal communication devices that can be used to allow a digital message generated on the personal communication devices by placing a call through one of the base stations and memory for storing a digital value corresponding to a monetary value. The personal communication device may also be used as a cellular position locator to determine one's geographic location and, if desired, to access information from a merchant information database containing information pertaining to a plurality of participating merchants located within the geographic territory covered by the cellular communication network. The merchant information may be stored on a database that is accessible by merchants so those merchants can add, delete or alter information contained in their respective listings. An incentive system is also provided for creating incentives for participating users to encourage. This computer implemented incentive program for encouraging certain participant actions includes a first reward program under which participants may earn points for certain actions and a second reward program through which the redemption rate associated with a particular participant is adjusted in response to certain participant action. The incentive program has a wide range of applications, including transportation, financial services and computer gaming.
Owner:BEDNAREK MICHAEL D

Data aggregation server for managing a multi-dimensional database and database management system having data aggregation server integrated therein

Improved method of and apparatus for aggregating data elements in multidimensional databases (MDDB). In one aspect of the present invention, the apparatus is realized in the form of a high-performance stand-alone (i.e. external) aggregation server which can be plugged-into conventional OLAP systems to achieve significant improments in system performance. In accordance with the principles of the present invention, the stand-alone aggregation server contains a scalable MDDB and a high-performance aggregation engine that are integrated into the modular architecture of the aggregation server. The stand-alone aggregation server of the present invention can uniformly distribute data elements among a plurality of processors, for balanced loading and processing, and therefore is highly scalable. The stand-alone aggregation server of the present invention can be used to realize (i) an improved MDDB for supporting on-line analytical processing (OLAP) operations, (ii) an improved Internet URL Directory for supporting on-line information searching operations by Web-enabled client machines, as well as (iii) diverse types of MDDB-based systems for supporting real-time control of processes in response to complex states of information reflected in the MDDB. In another aspect of the present invention, the apparatus is integrated within a database management system (DBMS). The improved DBMS can be used to realize achieving a significant increase in system performance (e.g. deceased access/search time), user flexibility and ease of use. The improved DBMS system of the present invention can be used to realize an improved Data Warehouse for supporting on-line analytical processing (OLAP) operations or to realize an improved informational database system, operational database system, or the like.
Owner:YANICKLO TECH LIABILITY +1

Systems and methods for electronically verifying and processing information

InactiveUS20030009418A1Reduce riskFacilitate a convenient, efficient and expeditious credit-risk evaluationFinanceLogisticsInternet privacyProcess information
A computer implemented method and system which provides current, reliable and accurate personal information regarding a prospective borrower and/or co-borrower. The system includes a central server which receives requests for personal information relating to proposed borrowers, which in turn parses out similar requests relating to that borrower to information sources such as, among others, the Internal Revenue Service, the Social Security Administration, the Daily Banking System and the pertinent credit bureaus. Information corresponding to the respective requests is retrieved from the information sources, and then compiled into a report format and forwarded to the requested party. The requested party may be the borrower/consumer individually, or may be a mortgage broker/agent, lending institution or other party authorized to request and obtain the information. An electronic signature or signatures accompany the request to the central server, which uses same to retrieve personal information data pertaining to the signatory(ies). Various encryption schemes may be employed for security purposes. The invention permits for the retrieval, compilation and reporting of relevant, personal data to a party or parties involved in the loan decision making process without any opportunity for the information to be tampered with by the proposed borrower(s) because the information is obtained electronically and directly from the information depositories.
Owner:GREEN GERALD M +1

Secure online music distribution system

A secure music distribution system securely distributes digital products such as music, video, and/or computer software along with related media over a public telecommunications network, such as the Internet, employing a client-server architecture. The digital products are stored and controlled by a content manager computer system and are sold by separate merchant computer systems. The secure music distribution system includes a music distribution center which operates with any number of client systems and with any number of merchant systems. The music distribution center includes a content manager and at least one delivery server. The content manager maintains a media information database, a master media file system, and a transaction database. In addition, the music distribution center interfaces with a media licensing center, which in turn communicates with one or more distributed rights agent servers and the merchant servers. The merchant server executes in a merchant computer system, which also includes an HTTP (HyperText Transfer Protocol) server. The merchant servers interface with various payment processing systems. The client systems include a media player and a Web browser. Additional delivery servers and media licensing centers operate independently and externally to the music distribution center and interface with the music distribution center.
Owner:MICROSOFT TECH LICENSING LLC

Dynamic group formation for social interaction

A system and method that facilitates dynamic group formation for social interaction and/or real-time sharing of content with the group is provided. A group formation system includes a user interface component that facilitates a user's entry of information and display of information regarding group formation. For example, the user interface component can be employed, for example, with a mobile communication device such as a mobile phone, personal digital assistant (PDA), a smart phone, a small, web based mobile or a wireless application protocol (WAP) client, and/or a regular web client. The system can further include a group formation component that forms a group based, at least in part, upon information received from a user via the interface component. The group configuration component can further store information regarding groups (e.g., a name/identifier, member(s), event(s) and/or shared context associated with the group) in a group information data store. For example, the group configuration component can form a group based, at least in part, upon information stored in the group information data store (implicit group formation). The group information data store can, optionally, provide archival access to communications and/or shared content (e.g., through a mobile communications device and/or a PC-based web browser).
Owner:MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products