Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

756 results about "Pointing systems" patented technology

Point system. n. 1. A system of evaluating academic achievement based on grade points. 2. Any of various printing or writing systems for the blind, such as Braille, that use an alphabet of raised symbols or dots that correspond to letters.

System and method for permitting three-dimensional navigation through a virtual reality environment using camera-based gesture inputs

A system and method for permitting three-dimensional navigation through a virtual reality environment using camera-based gesture inputs of a system user. The system comprises a computer-readable memory, a video camera for generating video signals indicative of the gestures of the system user and an interaction area surrounding the system user, and a video image display. The video image display is positioned in front of the system user. The system further comprises a microprocessor for processing the video signals, in accordance with a program stored in the computer-readable memory, to determine the three-dimensional positions of the body and principle body parts of the system user. The microprocessor constructs three-dimensional images of the system user and interaction area on the video image display based upon the three-dimensional positions of the body and principle body parts of the system user. The video image display shows three-dimensional graphical objects within the virtual reality environment, and movement by the system user permits apparent movement of the three-dimensional objects displayed on the video image display so that the system user appears to move throughout the virtual reality environment.
Owner:PHILIPS ELECTRONICS NORTH AMERICA

Method and system for issuing, aggregating and redeeming points based on merchant transactions

A loyalty or reward point system that utilizes the pre-existing infrastructure of a typical credit card network. In one embodiment, a user makes a purchase at a merchant of a product using a credit card. The merchant contacts the acquiring bank (which may be any type of financial institution but is referred to generically herein as a bank) with which it has contracted for credit card network services, and as known in the art, will get an approval or decline message after the acquiring bank contacts the issuing bank of the credit card used by the purchaser. Assuming that the purchase transaction is approved, the user is awarded loyalty points from the merchant based on the amount of the purchase (e.g. 100 points for a $100 purchase). A central server resides on the credit card network and tracks the transaction between the merchant, the acquiring bank, and the issuing bank. A reward account is maintained on the central server on behalf of the merchant and the user, and the number of reward points in the user's account for that merchant is increased accordingly. In an alternative embodiment, the user's reward points are logged in an account maintained by the acquiring bank on behalf of the merchant (with which it has a contractual relationship) and the user. The user may redeem the reward points earned from the transaction with the merchant at a later time, or may redeem the points with another merchant on the credit card network, or may aggregate those reward points with those of other merchants into a central exchange account, and then redeem the aggregated points for goods or services from any approved merchant on the network, depending on the configuration of the system.
Owner:SIGNATURE SYST

Method of and system for detecting an anomalous operation of a computer system

A real-time approach for detecting aberrant modes of system behavior induced by abnormal and unauthorized system activities that are indicative of an intrusive, undesired access of the system. This detection methodology is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is founded on a study of the internal behavior of the software system. As a software system is executing, it expresses a set of its many functionalities as sequential events. Each of these functionalities has a characteristic set of modules that is executed to implement the functionality. These module sets execute with clearly defined and measurable execution profiles, which change as the executed functionalities change. Over time, the normal behavior of the system will be defined by the boundary of the profiles. An attempt to violate the security of the system will result in behavior that is outside the normal activity of the system and thus result in a perturbation of the system in a manner outside the scope of the normal profiles. Such violations are detected by an analysis and comparison of the profiles generated from an instrumented software system against a set of known intrusion profiles and a varying criterion level of potential new intrusion events.
Owner:STRATACLOUD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products