Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

4545 results about "Message passing" patented technology

In computer science, message passing is a technique for invoking behavior (i.e., running a program) on a computer. The invoking program sends a message to a process (which may be an actor or object) and relies on the process and the supporting infrastructure to select and invoke the actual code to run. Message passing differs from conventional programming where a process, subroutine, or function is directly invoked by name. Message passing is key to some models of concurrency and object-oriented programming.

Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true- personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions

All-in-one wireless mobile telecommunication devices, methods and systems providing greater customer-control, instant-response anti-fraud/anti-identity theft protections with instant alarm, messaging and secured true-personal identity verifications for numerous registered customers/users, with biometrics and PIN security, operating with manual, touch-screen and/or voice-controlled commands, achieving secured rapid personal/business e-banking, e-commerce, accurate transactional monetary control and management, having interactive audio-visual alarm/reminder preventing fraudulent usage of legitimate physical and/or virtual credit/debit cards, with cheques anti-forgery means, curtailing medical/health/insurance frauds/identity thefts, having integrated cellular and/or satellite telephonic/internet and multi-media means, equipped with language translations, GPS navigation with transactions tagging, currency converters, with or without NFC components, minimizing potential airport risks/mishaps, providing instant aid against school bullying, kidnapping, car-napping and other crimes, applicable for secured military/immigration/law enforcements, providing guided warning/rescue during emergencies and disasters.
Owner:VILLA REAL ANTONY EUCLID C

System and method for searching, finding and contacting dates on the Internet in instant messaging networks and/or in other methods that enable immediate finding and creating immediate contact

Computer dating is applied to instant messaging, in a novel, systematic and flexible way. This system and method enable the user to search and find instantly compatible dates in instant messaging networks on the basis of attribute search or 1-way compatibility search or 2-way compatibility search, and to search either for potential dates that are currently Online or also for dates that are currently Offline. Many additional features are described, and especially for example features that are based on improved integration between computer dating and instant messaging. Important features include for example: a. Integration of the dating environment with the contactee list (buddy list). b. Generating a list of compatible dates with different markings for people that are online or offline or a list divided into sub-lists or separate lists according to this. c. Applying a reverse variation by adding Instant messaging features to an Online dating site. d. Automatic instant notification when a new highly compatible date is available, instead of only periodical reports. e. Using a database of systematic pictures to which the users relate in defining their own appearance and the appearance of the desired date. f. Automatic finding of duplicate records. g. Addition of “OR” and/or “IF” relationships between questions instead of only the usual “AND”.
Owner:MAYER YARON

Method of adding a device to a network

A method of adding a device to an existing or new electrical or electronic automation or multimedia network. The invention facilitates adding a device to the network that can communicate using various protocols such as LonWorks, CEBus, X-10, etc. over media such as AC power line, IR, RF, twisted pair, optical fiber, etc. The method is a mechanism for adding a device to a system that can be used by an ordinary user of network capable electrical devices. The method comprises the steps an installer would perform including the handshaking that needs to occur between devices to accomplish the binding process. A Functional Profile for LonWorks networks is given as an example. This includes a Home Device profile that employs an automated explicit type messaging for all devices intended for use in a home environment. The invention includes adding to the device an install button and a visual indicator for status such as an LED. Alternatively, existing buttons and LEDs on the device may be used for installed and binding purposes. Other methods of binding can be employed by the use of wired or wireless handheld tools, remote controls, etc. Other interfaces and user feedback can be used such as touch screen, personal computers, cellular phones, PDAs, etc which can offer simple ‘virtual’ binding by the press of an icon versus the physical button on the device. The binding can be performed locally or remotely such as via LAN, WAN, Internet, etc.
Owner:LEVITON MFG

System for eliminating unauthorized electronic mail

A system for eliminating unauthorized email sent to a user on a network employs an email-receiving server connected between the network and the user's email client for receiving email addressed to the user and rejecting those in which the sender address does not match any of sender addresses maintained on an “authorized senders” list (ASL list). The ASL lists are maintained by an ASL manager in an ASL database operable with a spam processor module. A redirector module rejects the email if, upon sending a request for validation to the spam processor module, the sender's address does not match any authorized sender address on the ASL list. Email rejected by the redirector module is redirected to a web-based messaging (WBM) module which sends a message to the sender to confirm that the sender is a legitimate sender of email to the intended recipient. If the sender logs on to confirm their status, the WBM module executes an interaction procedure which can only be performed by a human, in order to ensure that the confirmation procedure is not performed by a mechanical program. The ASL manager maintains the ASL lists based upon sender address data collected from various sources and analyses of various email usage factors, including sent email, received email, contact lists maintained by the user, user preference inputs, third party programs, etc.
Owner:CUFER ASSET LTD LLC

System, apparatus and method for automatic address updating of outgoing and incoming user messages in a communications network

A system, apparatus and method automatically update address information of a user's outgoing and incoming messages to / from a communication network thereby relieving the user of the burden of manually entering address changes into a user address book. A plurality of users are coupled through terminals to a server in the communication network for exchanging telephone, CATV, Internet, intranet for messaging, facsimile, etc purposes. The server includes a message store; stored message profile; and is coupled to a change server linked to a network. The change server includes search rules and change options provided by the users in directing the change server in finding correct and alternative address information when erroneous or unknown information is detected in the outgoing and incoming messages. Each user address book includes a series of contacts for each user. Each contact is identified by an identification number, ID, including a name and address. The server detects message headers where a "Send To Address" is not in the address book. The change server is activated and accesses external databases for correct or alternative addresses in accordance with search rules provided by the user. The alternative or correct address books address information is installed in the users address book and the "Send To Message" process is executed. For returned messages incorporating erroneous information, the search server is again activated to access the databases for correct address information, after which the user's address book is updated thereby eliminating the time-consuming, irritating manual process of updating the user address book for outgoing and incoming messages.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

Method and system for consolidating and distributing information

A method and system are provided for consolidating and distributing information. Implementation of system functionalities for both restricted local and unrestricted system-wide uses are permitted. Open standards for hardware, software and firmware components and standardized medical codes, definitions and formats are supported. The preferred embodiment of the invention provides an integrated health care system. The invention can also be used to allow secure access to Social Security, annuity, retirement account, and benefit information, allowing individuals a unified view of their benefit and payment status. A centralized host maintains, consolidates, and redistributes information generated at all networked locations. Information is electronically transferred among the system components to link an individual's local records to those stored remotely. The individual information device, centralized host computer, and any other computers or networks linked to the system can therefore be automatically updated. An individual information device stores a service recipient's insurance information, a emergency records and critical health care histories. This information is accessed by the system for use in managing any aspect of the service recipient's health care. Portable terminals can be used to access the system. A portable terminal can also be used independently from the system to perform health care functions. Unrestricted system-wide, or restricted local uses are supported. Insurance coverage for services and treatments can be determined and the information transmitted directly from the carrier(s) to the service recipient and service provider(s). Supported features include service authorization, messaging, diagnostic services,coverage determination, billing, and electronic payment.
Owner:JOHNSON JANICE

Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions

All-in-one wireless mobile telecommunication devices, methods and systems providing greater customer-control, instant-response anti-fraud / anti-identity theft protections with instant alarm, messaging and secured true-personal identity verifications for numerous registered customers / users, with biometrics and PIN security, operating with manual, touch-screen and / or voice-controlled commands, achieving secured rapid personal / business e-banking, e-commerce, accurate transactional monetary control and management, having interactive audio-visual alarm / reminder preventing fraudulent usage of legitimate physical and / or virtual credit / debit cards, with checks anti-forgery means, curtailing medical / health / insurance frauds / identity thefts, having integrated cellular and / or satellite telephonic / internet and multi-media means, equipped with language translations, GPS navigation with transactions tagging, currency converters, with or without NFC components, minimizing potential airport risks / mishaps, providing instant aid against school bullying, kidnapping, car-napping and other crimes, applicable for secured military / immigration / law enforcements, providing guided warning / rescue during emergencies and disasters.
Owner:VILLA REAL ANTONY EUCLID C

Time division multiple access downlink personal communications system voice and data debit billing method

A method and apparatus for full-duplex data communication in or for a wireless communications network, such as a cellular network, PCS network, or mobile satellite network, where a remote feature access control operation utilizes a switch to reserve and route selected voice channels or traffic channels in response to the remote feature access control operation. The method comprising the steps of: configuring a mobile switching center (MSC) to route the selected voice channels to a multi-port protocol converter (MPPC) for transmitting a selected data message on the selected voice channel. Transmitting the selected data message via the multi-port protocol converter on the selected voice channel via a data messaging channel during the remote feature access control operation. Then the selected data message is received at a communicator, which is communicatively linked to a reverse voice and/or digital traffic channel of the wireless network, thereby providing for both forward and reverse messaging on the wireless communications network. An apparatus is disclosed for data communication in or for a wireless communications network for transmitting and receiving both forward and reverse voice, traffic, and control channel messages utilizing the disclosed methodology.
Owner:AERIS COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products