Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

144 results about "Internet use" patented technology

Method for preventing malicious software installation on an internet-connected computer

A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.
Owner:KYNDRYL INC

Richard and Preston super network, "The Super Net"

We have invented extensions to the current Domain Name System which include top level domains that create more available domain names. Some of the newly introduced top level domains provide information on a web sites location of operation. This will enable search engines to categorize search results based on location. Also the domain name systems we introduce, provide a long term method of expanding the current domain name system. They also offer domain names which include words internet users are familiar with. Some of the new top level domains address growing internet related areas in which domain name usage will be pertinent. Areas such as communications and internet capable devices will benefit from the top level domains created specifically for them. Another area addressed by the new top level domains is countries with large internet usage. Countries like Japan United States and China can use multiple top level domains created specifically for them because of their large number of internet users and high tech businesses. The need for personal web sites is also increasing. Internet profiles are means for people to allow others to view information about them. A new extension for personal websites will allow more people to have a web address to post information about them. The domain name systems and top level domains we have invented will coexist with the current domain name system.
Owner:WILSON RICHARD PHILLIP +1

Uni-directional cross-domain identity verification based on low correlation of private cipher key and application thereof

The invention provides a method for low-correlation one-way cross-domain identity authentication based on private key. The method comprises the following steps: a user registers a user name in a common ID server and the system allocates a common ID to the user if the registration is successful; the user logins to the common ID server to acquire the authenticated ID; the user clicks the link of a Website in the common ID server and the common ID server transfers the common ID of the user and a relevant key to the Website; the Website receives the parameters transferred from the common ID server, if determining the first visit, allocates the user name to the user by use of the acquired two parameters (i.e. common ID and key) and calls a log-in module to succeed in the identity authentication; and if determining the second visit, the Website calls the log-in module to succeed in the identity authentication by use of the acquired two parameters (i.e. common ID and key). The method is applied to the log-in procedure bound to the mobile telephone number of the user and the multiple internet application names of the user in the mobile internet, and has the advantages of good privacy property, easy use, convenience for network management and strong applicability.
Owner:黄希 +1

Premium investigation system with accurate advertisement dissemination effect

The invention discloses a premium investigation system with an accurate advertisement dissemination effect, which is based on a premium investigation system terminal and an information service model of a website. The investigation system comprises a businessman question make-out system, a user answering system, an intelligent question allocation system and a data statistics analysis system. The investigation system provided by the invention can be landed with the aid of special ID information through Internet, the businessman can make out questions according to a question template; users can answer the questionnaire, obtain compensation, and participate in a campaign of drawing a lottery; and a statistics report can be sent to the businessman through the system. Through the system provided by the invention, a traditional model that the advertising information is passively received by audiences is changed, and the billing is performed according to the watching and right comprehension of audiences, so the historic breakthrough from the price to the value of the advertisement is realized, the real-time dynamic monitoring is achieved, the accurate advertisement effect can be measured, and the audiences can gain the advertising information and a certain remuneration during entertainment, and accordingly, the user experience value is promoted, and the interactive watching becomes the mainstream and trend.
Owner:深圳市英尔科技有限公司

Method for preventing malicious software installation on an internet-connected computer

A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.
Owner:KYNDRYL INC

Multicast-based network data pre-pushing method

ActiveCN103249006ATo overcome the disadvantage of repeated transmissionImprove resource utilizationEnergy efficient ICTBroadcast service distributionFrequency spectrumHabit
The invention discloses a multicast-based network data pre-pushing method, and belongs to the technical field of wireless network data transmission. In wireless network data transmission, when a user requests network data, according to task request analysis and current network channel states, a base station determines whether the task is pre-pushed in a multicast manner to users with similar internet use habits and within the coverage area of the base station or in neighboring cells; according to a prior probability function of user's internet use habits accumulated previously and channel states of active users, an alternative user scheme, a multi-cell coordinated transmission scheme and a modulation coding scheme that all participate in multicast pre-pushing are calculated; expected revenue which can be obtained by adopting the multicast manner is calculated; and compared with a conventional unicast manner, if the multicast manner obtains the revenue greater than a set threshold value, the multicast-based network data pre-pushing method is adopted for pushing, otherwise, a conventional method is adopted for pushing. The multicast-based network data pre-pushing method can effectively improve the wireless spectrum efficiency and the energy efficiency, and optimizes the transmission performance of the network on the whole.
Owner:北京英特赛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products