Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4336 results about "Information sharing" patented technology

The term "information sharing" gained popularity as a result of the 9/11 Commission Hearings and its report of the United States government's lack of response to information known about the planned terrorist attack on the New York City World Trade Center prior to the event. The resulting commission report led to the enactment of several executive orders by President Bush that mandated agencies implement policies to "share information" across organizational boundaries. In addition, an Information Sharing Environment Program Manager was appointed, tasked to implement the provisions of the Intelligence Reform and Prevention of Terrorism Act of 2004. In making recommendation toward the creation of an "Information Sharing Environment" the 9/11 Commission based itself on the findings and recommendations made by the Markle Task Force on National Security in the Information Age. The term "information sharing" in the information technology lexicon has a long history. Traditional information sharing referred to one-to-one exchanges of data between a sender and receiver. These information exchanges are implemented via dozens of open and proprietary protocols, message and file formats.

Machine-implemented activity management system using asynchronously shared activity data objects and journal data items

Machine-assisted methods and apparatus are disclosed for allowing individual users to develop and organize respective activity descriptions and supporting journal items according to their respective preferences. Cross-referencing mappings may be created between activity descriptions and journal items in order to find, filter and organize disparate data. Cross-referencing mappings may also be created between the developed activity descriptions of different users so they can better understand each others perspectives and possibly overlapping goals. Different users' activity descriptions can be presented to a user even while the user may be disconnected from communication networks. Hierarchical relationships between activity descriptions may be provided. Machine-assisted means may be provided for creating work-sharing, work-delegating and / or informational sharing agreements between different users. Further machine-implemented means may be provided for automatically and asynchronously updating users on shared activities by other users even though all users are not necessarily connected to one or more respective communication networks at same time.
Owner:CALLAHAN CELLULAR L L C

Multi-sensor integration for a vehicle

A sensor system for use in a vehicle that integrates sensor data from more than one sensor in an effort to facilitate collision avoidance and other types of sensor-related processing. The system include external sensors for capturing sensor data external to the vehicle. External sensors can include sensors of a wide variety of different sensor types, including radar, image processing, ultrasonic, infrared, and other sensor types. Each external sensor can be configured to focus on a particular sensor zone external to the vehicle. Each external sensor can also be configured to focus primarily on particular types of potential obstacles and obstructions based on the particular characteristics of the sensor zone and sensor type. All sensor data can be integrated in a comprehensive manner by a threat assessment subsystem within the sensor system. The system is not limited to sensor data from external sensors. Internal sensors can be used to capture internal sensor data, such a vehicle characteristics, user attributes, and other types of interior information. Moreover, the sensor system can also include an information sharing subsystem of exchanging information with other vehicle sensor systems or for exchanging information with non-vehicle systems such as a non-movable highway sensor system configured to transmit and receive information relating to traffic, weather, construction, and other conditions. The sensor system can potentially integrate data from all different sources in a comprehensive and integrated manner. The system can integrate information by assigning particular weights to particular determinations by particular sensors.
Owner:YAZAKI NORTH AMERICA

Cryptographic method and system

The present invention relates to the field of security of electronic data and / or communications. In one form, the invention relates to data security and / or privacy in a distributed and / or decentralised network environment. In another form, the invention relates to enabling private collaboration and / or information sharing between users, agents and / or applications. Embodiment(s) of the present invention enable the sharing of key(s) and / or content between a first user and / or agent and a second user and / or agent. Furthermore, embodiment(s) of the present invention have application in sharing encrypted information via information sharing services.A number of inventions, aspects and embodiments are disclosed herein.
Owner:LOCK BOX

Processes systems and networks for secure exchange of information and quality of service maintenance using computer hardware

A system and method for providing external data-signal isolation, and signal-level information-preserving-data-transformations, to enable safe, operationally efficient, information sharing between protected information systems and networks and external, potentially hostile, information systems and networks which neutralizes any imbedded hostile executable codes such as viruses that may be in data-signals incoming from the external systems and networks. The system and method prevent untransformed external data-signals from entering protected systems and / or networks using an intermediate screen which is a computer hardware device. The intermediate screen (which may be implemented as a network of systems) is deployed between the protected systems and external systems and is used to process all incoming signals from the external system to obtain transformed data sets from which information is extracted before it is passed to the protected system. The incoming signals all remain confined in the intermediate screen.
Owner:KELLUM CHARLES W

Automated contact information sharing

Provided is a system for controlling, distributing and receiving contact information. The system includes: central hub means for maintaining and distributing contact information, multiple terminal means electronically coupled to the central hub means for transmitting requests for contact information to the central hub means, and multiple contacts in communication with the central hub means. Each contact has an associated contact record maintained by the central hub means, each such contact record includes multiple different contact information fields, and each contact controls the content in the contact information fields for its associated contact record. Upon receipt of a request for a requested contact record from one of the terminal means, the central hub means automatically transmits the requested contact record to the requesting terminal means in a format that permits unambiguous identification of the different contact information fields upon application of pre-specified mechanical rules.
Owner:SWAN JOSEPH G

Method and device for medical information sharing privacy protection based on blockchain technology

The invention discloses a method and device for medical information sharing privacy protection based on a blockchain technology. According to the method, in aspects of privacy protection based on a blockchain technology, medical data on-chain and off-chain storage and forced privacy protection safety multiparty calculation, illegal medical data obtaining, use and tampering are avoided, and medical information sharing, big data analysis and utilization and patient privacy protection are implemented. The device comprises a data storage module, a service module provided based on the blockchain technology and a call service module provided externally, wherein a three-layer data storage frame is adopted for the data storage module; and the service module provided based on the blockchain technology mainly comprises forced privacy protection safety multiparty calculation. The method and device for medical information sharing privacy protection based on the blockchain technology are mainly applied to the fields of method and device for medical information sharing privacy protection based on a blockchain technology and medical big data analysis and the like, and technical guarantee is also provided for patient privacy protection while medical information sharing is achieved based on the blockchain technology.
Owner:HANGZHOU DIANZI UNIV

Multi-user functionality for converting data from a first form to a second form

In connection with a machine-based system for transforming data from a source form to a target form, a tool is provided for sharing information established in developing a transformation model. The shared information may relate to rules for mapping source collection terms to standardized terms, rules for ordering or syntax, rules for classifying terms or other transformation rules. Such information defines a knowledge base for the project. The knowledge base is divided into domains and subdomains that define a hierarchy that includes dependencies and references. These dependencies and references are used for domain management such that any conflicts and inconsistencies can be identified and arbitrated. In this manner, information sharing is accommodated, for example, for efficient knowledge base creation and multi-user functionality.
Owner:ORACLE INT CORP

Systems and methods for managing affiliations

An affiliation manager provides each of typically hundreds of users with a calendar of appointments and a task list each including icons for capturing time and expenses accrued by the user when attending a particular appointment or performing a particular task. A subset of collected captured time and expenses may be transferred to each requesting client for use by independent accounting systems. Management of appointments and tasks from a central database promotes collaboration among users, simplifies sharing of schedule information among users, and provides context for data entry. Each user may create any number of affiliations, each affiliation describing affiliations of the user in numerous projects, organizations, employments, and activities. Each user may admit other users to share his or her affiliations, thereby promoting collaboration of many users for jointly attending meetings and jointly performing tasks. Context permits automatic intuitive association of email, chat messages, notes, and documents to records for persons, locations, resources, appointments, tasks, and projects for integrated affiliation management services. Requests for queries and forms are interpreted according to the context in which the user issued the request. Requests are made via a common set of icons and links on each item of a list provided by a prior query.
Owner:TIME ECLIPSE

Creating collaborative application sharing

A system is disclosed that provides a goal based learning system utilizing a rule based expert training system to provide a cognitive educational experience. The system provides the user with a simulated environment that presents a training opportunity to understand and solve optimally. The technique establishes a collaborative training session, including the steps of establishing a network connection between a plurality of users, selecting a mode for the network connection between the plurality of users, establishing a network connection mode between the plurality of users, and synchronizing the mode between the plurality of users. Modes of operation include application sharing, whiteboarding, media sharing, newsgroup information sharing chatroom initiation and discussion group initiation.
Owner:ACCENTURE GLOBAL SERVICES LTD

System and method for facilitating reciprocative small business financial information exchanges

Systems and methods facilitate information sharing among a plurality of member institutions. Each member is associated with a member number and a corresponding member profile. A member contributes its data relating to small business entities to an exchange repository upon becoming a member, and thereafter on a periodic basis. Each member is eligible to query against the exchange repository. However, a response to a member's inquiry is determined by a reciprocity due to the inquiring member. If a member contributes comprehensive information regarding small business entities in its portfolio, then the member receives comprehensive information relating to a small business entity that becomes a subject of its inquiry. If a member contributes minimal information regarding the small business entities in its portfolio, the member receives minimal information relating to a small business entity that becomes a subject of its inquiry, regardless of the amount of information available in the exchange repository. Each business entity regarding which information is stored in the exchange repository is associated with a business entity identifier. A business entity identifier associates a record file for the corresponding small business entity. The record file includes trade data of the small business, data relating to one or more principals of the small business entity, as well as data relating to one or more guarantors of the small business entity, as appropriate.
Owner:EQUIFAX INC

Processes systems and networks for secured information exchange using computer hardware

A system and method for providing external data-signal isolation, and signal-level information-preserving-data-transformations, to enable safe, operationally efficient, information sharing between protected information systems and networks and external, potentially hostile, information systems and networks which neutralizes any imbedded hostile executable codes such as viruses that may be in data-signals incoming from the external systems and networks. The system and method prevent un-transformed external data-signals from entering protected systems and / or networks using an intermediate screen which is a computer hardware device. The intermediate screen (which may be implemented as a network of systems) is deployed between the protected systems and external systems and is used to process all incoming signals from the external system to obtain transformed data sets from which information is extracted before it is passed to the protected system. The incoming signals all remain confined in the intermediate screen.
Owner:CYBERDFNZ

Computer implemented system and method for the generation of data access applications

A method and architecture is described that discovers software application metadata and generates data access applications based on the discovered software application metadata. The discovered metadata along with handcrafted metadata goes through a discovery process and is converted into common, generic abstract metadata objects. The abstract metadata objects then go through an instantiation process to be translated into concrete metadata objects that represent the unique configuration, context and terminology of the source software application. The concrete metadata objects can be generated into numerous forms for the purposes of data access and information sharing. The system also has upgrade protection.
Owner:NOETIX CORP

Abstractions and automation for enhanced sharing and collaboration

The present invention provides methods for using abstractions of people, including dynamic and static groups of people, to enhance the efficiency of the specification and automation of policies for sharing information between users with a “need-to-know.” An instance of the present invention can also provide these users information based on a “time-to-know.” By providing access to information based on group affiliation and properties of the content of the information, the present invention maintains optimal information privacy while minimizing encumbrances to sharing data with appropriate users and even at appropriate times. The present invention can be integrated with other communication technologies to facilitate access to information in a time appropriate manner. Other instances of the present invention employ automated and semi-automated, mixed-initiative techniques, to make information-sharing decisions. Additional instances of the present invention include the employment of machine-learning techniques to facilitate construction of access policies from the actions or profile of a single user or a community of users, including the construction of automated sharing agents that work in an automated or mixed-initiative manner to respond to real-time requests for information.
Owner:MICROSOFT TECH LICENSING LLC

Dynamic creation of information sharing social networks

A system and method for creating and using a searchable and browsable directory of verified, network connected and geo-coded users, listing members according to their proximity to each other and according to the longitude and latitude coordinates of each user. By making the member directory accessible to users dynamically the system eases the connection and interaction of neighbors and members of the same physical community.
Owner:HORAN TIM

Mobile health book

A mobile health book (MHB) is incorporated into a mobile device such that users can manage and track health care related information for the user. The mobile health book includes a health tracking software program stored on the memory of the mobile device. The health tracking software receives and stores various health related information for the user. The health tracking software program communicates with at least the contact management program and calendar program on the mobile device to integrate the function of these programs with the health tracking software. The mobile device is able to communicate with other mobile devices such that health related information from the mobile device can be shared and synchronized with similar information on a second mobile device. The synchronization and sharing of health related information between multiple mobile devices allows the user of one mobile device to track and monitor health related information for a second user through the wireless sharing of information.
Owner:VENON MEDHI O +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products