Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

103 results about "Java applet" patented technology

A Java applet was a small application written in the Java programming language, or another programming language that compiles to Java bytecode, and delivered to users in the form of Java bytecode. The user launched the Java applet from a web page, and the applet was then executed within a Java virtual machine (JVM) in a process separate from the web browser itself. A Java applet could appear in a frame of the web page, a new application window, Sun's AppletViewer, or a stand-alone tool for testing applets.

Method for distributed acquisition of data from computer-based network data sources

A method for facilitating efficient automated acquisition of data from computer-based network data sources, such as Internet websites, by means of one or more data aggregation servers and a distributed network of one or more client computers (each operated by and/or on behalf of one or more end users), that does not trigger "trespass on chattels" protection, violate copyright protection of database compilations of non-copyright data or allow data sources to easily detect automated data acquisition. In a specific embodiment, each user runs a java applet within their Internet browser that frequently polls a server connected to a database storing the user's preferences. Based on the user's preferences and other data stored in the database, the server generates requests (each to be issued by the client machine to a particular website) and tells the user's applet to issue those requests. Response(s) (or a processed version of those responses) returned to the server may be used by the client machine and/or returned to the server where they may be parsed, stored in the database, made available to the user (and, potentially, other users) and may trigger the server to generate follow-on requests. This method has many potential uses, including, but certainly not limited to, the aggregation of real estate data from numerous websites for homebuyers.
Owner:OPTIMALHOME

Method of and system for producing transaction-enabling graphical user interfaces at internet-enabled terminals in response to reading bar code symbols pointing to html-encoded documents embedded with java-applets and stored on HTTP information servers

A code symbol driven system and method are disclosed for producing graphical user interfaces which enable prespecified information-related transactions over the Internet. In the illustrative embodiment, the code symbol reader is integrated with a Java-enabled Internet terminal. The code symbol reader is used to read a code symbol (e.g., magstripe or bar code) encoded with information related to or specifying a predetermined Uniform Resource Locator (URL). The predetermined URL specifies the location of a HTML-encoded document that is stored in an HTTP server and contains one or more transaction-enabling Java-Applets. When the code symbol is read using the code symbol reader, and data representative of the URL is provided to a Java-enabled browser program, the corresponding HTTP document is automatically accessed and displayed at the terminal. The transaction-enabling Java-Applet embedded therein is executed in order to produce a graphical user interface on the display screen of the terminal, thereby enabling the user to carry out data entry and display operations related to the prespecified information-related transaction. The transaction-enabling Internet terminal of the present invention can be in the form of an Internet kiosk installed in a public location, in the manner as conventional ATMs. By virtue of the present invention, the code symbol driven system can be easily deployed for use by the mass population so that they can easily conduct various types of information-related transactions, including electronic-commerce, over the Internet.
Owner:METROLOGIC INSTR

Method of and system for accessing consumer product related information at points of consumer presence on the World Wide Web(WWW) at which UPN-encoded java-applets are embedded within HTML-encoded documents

Method of and system for delivering consumer product related information to consumers over the Internet. The system and method involves creating an UPN-encoded Consumer Product Information (CPIR) enabling Applet for each consumer product registered within a manufacturer-managed UPN / URL database management system. Each CPIR-enabling Applet is encapsulated within an executable file and then stored in the UPN / URL database management system. Each CPIR-enabling Applet is searchable and downloadable by, for example, (1) retailers purchasing products from an electronic-commerce enabled product catalog, (2) advertisers desiring to link consumer product information to Web-based product advertisements, or (3) anyone having a legitimate purpose of disseminating such information within the stream of electronic commerce. After downloading and extraction from its encapsulating file, the CPIR-enabling Applet is embedded within an HTML-encoded document associated with, for example, an EC-enabled store, on-line auction site, product advertisement, Internet search engine or directory, and the like. Upon encountering such an Applet-encoded HTML document on the WWW, the consumer need only perform a single mouse-clicking operation to automatically execute the underlying CPIR-enabling Applet (on either the client or server side of the network), causing a UPN-directed search to be performed against the manufacturer-defined UPN / URL Database, and the results thereof displayed in an independent Java GUI, without disturbing the consumer's point of presence on the WWW. Preferably, the CPIR-enabling Applets are realized using Java™ technology, although it is understood that alternative technologies can be used to practice the system and methods of the present invention.
Owner:PERKOWSKI THOMAS J

System and method for implementing digital signature using one time private keys

The OTPK module 40 is essential to the present embodiment. It may be considered to be a software module implemented on the signing entity 20. The OTPK module 40 may be dynamically downloaded for use or implemented as a pre-installed client plug-in. The OTPK module 40 may perform its role without significant intervention from a user when operating as the signing entity 20. The OTPK module 40 may be implemented as a PKCS#11 or CAPI DLL or a Java Applet or ActiveX plugin embedded within the Internet Web Browser. It may be automatically executed when performing secure transactions requiring digital signatures. The OTPK module 40 serves to independently and without additional instruction from a user carry out the steps of generating the asymmetric key pairs comprising the public key and the private key. The OTPK module 40 then contacts the authentication and certification server 50 for authenticating the identity of the signing entity 20. At this point, the user of the signing entity 20 may be prompted for a password or the password may have been entered earlier as part of a 2-factor authentication to the authentication and certification server 50. The private key is then automatically used to generate a digital signature for the signing entity 20. At this point onwards, the private key is then irretrievably deleted such that it cannot be re-used or copied for future use.
Owner:DATA SECURITY SYST SOLUTIONS PTE

Zero-configuration secure mobility networking technique with web-based authentication interface for large WLAN networks

A zero-configuration secure mobility networking technique for WLANs is provided, utilizing split link-layer and a Web-based authentication. The link-layer authentication process facilitates network-to-user authentication and generation of session-specific encryption keys for air traffic using digital certificates to prevent man-in-the-middle attacks without requiring users to have pre-configured accounts. Although any WLAN host can pass the link-layer authentication and obtain link connectivity, the WLAN only allows the host to obtain IP networking configuration parameters and to communicate with a Web-based authentication server prior to initiating the Web-based authentication process that is responsible for user-to-network authentication. The Web-based authentication server employs a Web page for initial authentication and a Java applet for consequent authentications. In the Web page, registered users can manually, or configure their Web browsers to automatically, submit their authentication credentials; new users can open accounts, make one-time payments, or refer the Web-based authentication server to other authentication servers where they have accounts. Once a user is authenticated to the WLAN, the user's mobile host obtains full IP connectivity and receives secure mobility support from the WLAN. The mobile host always owns a fixed IP address as it moves from one access point to another in the WLAN. All wireless traffic between the mobile host and the WLAN is encrypted. Whenever the mobile host moves to a new access point, a Java applet (or an equivalent client-side program delivered over Web) enables automatic authentication of the mobile host to the WLAN. In addition, the ZCMN method supports dynamic load balancing between home agents. Thus, a mobile host can change home agents during active sessions.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products