Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3969 results about "Recipient side" patented technology

Method for authorizing in data transmission systems

The invention relates to a method and to a device for the authorization in data transmission systems employing a transaction authorization number (TAN) or a comparable password. According to a first step, the user sends a qualifying identification of the data input apparatus together with a request for the generation or for the selection of a transaction authorization number TAN or of comparable password from a data file from the data input apparatus to an authorization computer. In a second step the authorization computer generates the transaction authorization number TAN or the comparable password or selects them form a data file. According to a third step, the authorization computer sends the transaction authorization number TAN or the comparable password over a second transmission path different from the first transmission path to a monitor, for example a pager. According to a fourth step, the user reads this transaction authorization number TAN or the comparable password from the receiver and enters the transaction authorization number TAN or the comparable password into the data input apparatus. According to a fifth step, this transaction authorization number TAN or the comparable password is transmitted to the authorization computer. According to a sixth step, the authorization computer verifies the validity of the transaction authorization number TAN or of the comparable password in order to establish or switch free, according to a seventh step, a connection between the data input apparatus and the receiver unit.
Owner:SCHMITZ KIM

Network configured for delivery of content for download to a recipient

Network systems and processes for delivery of electronic content to recipient processors may be configured to facilitate the delivery of relatively large content items and / or a relatively large number of content items. In one example, a movie rental system and process delivers (downloads) movie files to customers across the Internet. System network architecture includes three or more layers of servers, including a main server supporting an interface for recipient processors to request content items, a plurality of parent servers, and a plurality of edge servers. Edge servers are distributed throughout a region in which the system provides content delivery services to recipient processors. Parent servers, spaced across the service region, support edge servers. A copy of each content item available through the service is distributed from the main server to each parent servers for storage. Parent servers distribute content to edges servers, pursuant to instructions from the main server or requests from the edge servers. The main server receives and processes requests for content items from recipient processors and directs recipient processors to edge servers for obtaining requested content items. The main server also authenticates licenses and publishes rules for the distribution of content items.
Owner:BLOCKBUSTER LLC

Digital Content Protection Method and Apparatus

<heading lvl="0">Abstract of Disclosure</heading> Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resistant device communicates with another of the computational units acting as an interface control processor, and serves to protect the contents of a nonvolatile memory from unauthorized access or modification by other portions of the tamper-resistant device, while performing cryptographic computations using the memory contents. Content providers enforce viewing privileges by transmitting encrypted rights keys to a large number of recipient devices. These recipient devices process received messages using the protected processing environment and memory space of the secure unit. The processing result depends on whether the recipient device was specified by the content provider as authorized to view some encrypted digital content. Authorized recipient devices can use the processing result in decrypting the content, while unauthorized devices cannot decrypt the content. A related aspect of the invention provides for securing computational units and controlling attacks. For example, updates to the nonvolatile memory, including program updates, are supported and protected via a cryptographic unlocking and validation process in the secure unit, which can include digital signature verification.
Owner:CRYPTOGRAPHY RESEARCH

Traffic information providing system,traffic information expression method and device

The invention provides a traffic information display method which presents traffic information so as to quantatively indicate the reliability and superiority of traffic information. The invention also provides a traffic information providing system which clearly communicates an “unknown” section to the receiving party. The invention represents the state volume of traffic information by the state volume of each sampling point set by segmenting a target road and represents traffic information by using the state volume of traffic information and gray scale information which displays the reliability of the state volume in multiple levels. The user thus understands how reliable the traffic information is and properly evaluates the traffic information. The traffic information may be used to perform a high-accuracy path search and provide traffic information at a reasonable cost. The traffic information providing system of the invention includes traffic information providing apparatus for providing, as traffic information, the state volume of traffic information of each distance quantization unit set by segmenting a target road and mask bit information indicating that the state volume is valid or invalid, and traffic information utilization apparatus for reproducing a valid state volume by using the mask bit information. In the traffic information providing system, the receiving party clearly recognizes, based on the mask bit information, an “unknown” section enclosed by an ellipse:
Owner:PANASONIC CORP

Method and system for monitoring email and website behavior of an email recipient

A system for monitoring email and website behavior of an email recipient is provided. According to one exemplary embodiment, the system includes a mail enhancement server and a logging server. The mail enhancement server is configured to intercept all outgoing emails from a mail server. The mail enhancement server then modifies each outgoing email to include a tracking code. The tracking code is embedded in an image call which in turn is also inserted into the outgoing email. If the outgoing email contains hyperlinks, each hyperlink is also modified to include the tracking code. The tracking code is uniquely associated with the outgoing email. The image call (and the tracking code) is used to detect when the recipient of the outgoing email has opened that email. The tracking code, when embedded in a hyperlink, is also used to monitor whether the recipient has opened the email and/or clicked through on one or more of the hyperlinks in the email. The logging server associates a cookie with the recipient of the outgoing email. When the logging server receives an image call, the corresponding image and the cookie are concurrently delivered to the recipient. The cookie is used to monitor the behavior of the recipient at a website, regardless of how the recipient arrives at that website, be it through a click-through from the email or otherwise. The logging server is configured to capture and store relevant information relating to the outgoing email thereby allowing the sender of the outgoing email and the recipient to be linked and the behavior of the recipient to be monitored via the tracking code, the image call and the cookie.
Owner:XANT INC

Methods and systems for interchanging documents between a sender computer, a server and a receiver computer

A method for storing, accessing and interchanging voluminous confidential documents for review by a plurality of parties and for notifying selected ones of a plurality of receiving computers generally operated by unrelated business organizations of receipt by a predetermined host server of such electronic documents from a sender computer for review. The documents are reviewable by each respective receiving computer over a global communications network. The sender computer and the receiving computers are registered in the host server. The method comprises selecting one or more of the plurality of receiver computers to which selected documents are to be reviewed over the global communications network are addressed, storing the respective documents in a first database that is local relative to the sender computer, replicating the documents stored in the first database in a second database that is local relative to the predetermined server, issuing a respective notification message from the predetermined server to the selected receiver computers, each respective notification message indicating replicated documents available in the second database for their respective retrieval over the global communications network, and retrieving the replicated documents in the second database by the selected receiver computers over the global communications network upon a respective user of the selected receiver computers issuing a respective download command signal to the predetermined server.
Owner:FLEET NAT BANK

Architecture for a multi-port adapter with a single media access control (MAC)

A multi-port adapter having a single MAC chip has reduced logic circuits for transferring data between a host system and a TDM communication system. The MAC chip includes a transmit MAC and a receive MAC, each coupled at one end to a port multiplexer through an interface and at the other end to respective storage registers. The port multiplexer is coupled to the Physical Layer of each port. Transmit and receive state registers track the state of each port in the transfer of data in the transmit and receive directions. The storage registers are coupled through a host bus interface to a host bus and to the host system. Control logic is coupled to the storage register to control the transfer of data between the system and the storage registers. A port selector coupled between the multiplexer and the transmit and receive state registers selects ports for transfer of data in succession. On each chip clock cycle, the port selector selects a state machine register to determine the state of the MACs for processing the data and a section of the FIFO's to write or read data for the selected port. At the end of the cycle, the state registers are set and stay set until selected again. The process repeats for each port in a cyclic manner. Once data is accumulated in the receive storage register, control logic reads the data of the host bus. Once space is available in the transmit storage register, the control logic writes data from the host system to the transmit storage register.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products