Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

12889 results about "Relevant information" patented technology

Relevant information. Data which is applicable to the situation or problem at hand that can help solve a problem or contribute to a solution.

Method of and system for finding and serving consumer product related information over the internet using manufacturer identification numbers

A method of and system for finding and serving consumer product-related information on the Internet comprising a database serving subsystem which stores: a plurality of manufacturer identification numbers (MINs) assigned to a plurality of manufacturers of consumer products; a plurality of home-page specifying URLs symbolically linked to the plurality of MINs; a plurality of universal product numbers (UPN) assigned to a plurality of consumer products made by the plurality of manufacturers; and a plurality of product-information specifying URLs symbolically linked to the plurality of UPNs. During operation, a client subsystem transmits to the database serving subsystem, a request for information which includes the UPN assigned to the consumer product on which product-related information is being sought. The database serving subsystem automatically compares the UPN against the stored plurality of MINs, and automatically returns to the client subsystem, one or more of URLs symbolically linked to the UPN, if URLs have been symbolically linked to the UPN within the database serving subsystem. However, if no URLs have been symbolically linked to the UPN, then the database serving subsystem automatically returns the home-page specifying URL symbolically linked to the MIN contained within the UPN in the request. By virtue of this novel MIN-based search mechanism embodied within the database serving subsystem, client subsystems are automatically provided with the home-page of the manufacturer's World Wide Web (WWW) site in situations where product-information specifying URLs have not yet been symbolically linked with the UPN on any one of the manufacturer's products.
Owner:PERKOWSKI THOMAS J

Methods and apparatus providing electronic messages that are linked and aggregated

A method for associating related electronic messages in computer storage. A first transportable application is created and stored. User input requesting creation of a link from the first transportable application to another transportable application is received. User input that selects a second transportable application from among a plurality of previously created transportable applications is received. A link from the first transportable application to the second transportable application is created and stored. As a result, transportable application may be inter-related in complex message webs. The message webs may also be inter-related in message web rings. Links may be generated manually or automatically, based on context, workflow processes, or other known relationships among applications. Recipient lists and data may propagate among fields of linked transportable applications, directly or according to abstract business rules. Further, multiple-part electronic messages are disclosed. A graphical user interface of an electronic messaging system displays a message in the form of one or more header portions and one or more body portions. Each of the body portions has a selection region. While one body portion is visible at a given time, all the selection regions are continuously visible in the user interface to facilitate selection of any of the body portions at a particular time. Selecting a selection region of a non-displayed body portion causes a server to generate a refreshed user interface that includes the entirety of the selected body portion, and that hides the previously viewed body portion. As a result, a large amount of associated information may be combined in a single message in a way that is clearly organized and easily accessible.
Owner:METRICSTREAM

Advertising with video ad creatives

The serving of advertisements with (e.g., on) video documents may be improved in a number of ways. For example, a system may (a) accept information defining at least one ad spot associated with at least one instance of an video document, (b) accept offers to have advertisements served in the ad spot(s), and (c) arbitrate among competing advertisements, using at least the offers, to determine at least one advertisement to be served in that ad spot(s). As another example, a system may (a) accept relevance information for an advertisement, (b) determine at least one video document using the accepted relevance information, (c) present information about the video document(s) to an advertiser associated with the advertisement, and (d) accept, from the advertiser, an offer to have its advertisement served with at least one of the video document(s) accepted. As yet another example, a system may (a) accept relevance information for an video document, (b) determine a plurality of advertisements relevant to the video document using the relevance information and serving constraints of the advertisements, and (c) select at least one of the determined relevant advertisements to be served with the video document. Examples of video documents include video files published on the Internet, television programs, live or recorded talk shows, video-voice mail, segments of an video conversation, etc.
Owner:GOOGLE LLC

Security architecture with environment sensitive credential sufficiency evaluation

By including environment information in a security policy, a security architecture advantageously allows temporal, locational, connection type and/or client capabilities-related information to affect the sufficiency of a given credential type (and associated authentication scheme) for access to a particular information resource. In some configurations, time of access, originating location (physical or network) and/or connection type form a risk profile that can be factored into credential type sufficiency. In some configurations, changing environmental parameters may cause a previously sufficient credential to become insufficient. Alternatively, an authenticated credential previously insufficient for access at a given trust level may be sufficient based on a changed or more fully parameterized session environment. In some configurations, the use of session tracking facilites (e.g., the information content of session tokens) can be tailored to environmental parameters (e.g., connection type or location). Similarly, capabilities of a particular client entity (e.g., browser support for 128-bit cipher or availablity of a fingerprint scanner or card reader) may affect the availability or sufficiency of particular authentication schemes to achieve a desired trust level.
Owner:ORACLE INT CORP

Method of and system for enabling the access of consumer product related information and the purchase of consumer products at points of consumer presence on the world wide web (WWW) at which consumer product information request (CPIR) enabling servlet tags are embedded within html-encoded documents

Method of and system for delivering consumer product related information to consumers over the Internet. The system and method involves creating an UPN-encoded Consumer Product Information (CPIR) enabling Applet for each consumer product registered within a manufacturer-managed UPN / URL database management system. Each CPIR-enabling Applet is encapsulated within an executable file and then stored in the UPN / URL database management system. Each CPIR-enabling Applet is searchable and downloadable by, for example, (1) retailers purchasing products from an electronic-commerce enabled product catalog, (2) advertisers desiring to link consumer product information to Web-based product advertisements, or (3) anyone having a legitimate purpose of disseminating such information within the stream of electronic commerce. After downloading and extraction from its encapsulating file, the CPIR-enabling Applet is embedded within an HTML-encoded document associated with, for example, an EC-enabled store, on-line auction site, product advertisement, Internet search engine or directory, and the like. Upon encountering such an Applet-encoded HTML document on the WWW, the consumer need only perform a single mouse-clicking operation to automatically execute the underlying CPIR-enabling Applet (on either the client or server side of the network), causing a UPN-directed search to be performed against the manufacturer-defined UPN / URL Database, and the results thereof displayed in an independent Java GUI, without disturbing the consumer's point of presence on the WWW. Preferably, the CPIR-enabling Applets are realized using Java(TM) technology, although it is understood that alternative technologies can be used to practice the system and methods of the present invention.
Owner:PERKOWSKI THOMAS J

Method and system for facilitating electronic dispute resolution

A system for facilitating payment transaction disputes is provided. According to one aspect of the system, a user, such as an issuer, is allowed to use the system to resolve a disputed transaction. Based on information provided by a cardholder, the issuer is able to use the system to retrieve transactional information relating to the disputed transaction reported by the customer for review. When the issuer uses the system to retrieve information relating to the disputed transaction, a case folder is created. The case folder is a repository for storing all the relevant information and documentation relating to the disputed transaction. Using the information retrieved by the system, the issuer then determines whether to initiate a dispute. Alternatively, the system can also be used by an acquirer to respond to a dispute, usually on behalf of one of its merchant. If a dispute is responded to, a questionnaire is then created by the system. Alternatively, the issuer may decline to initiate a dispute and either seek additional information from the cardholder or deny the cardholder's inquiry. The case folder and the questionnaire are created for a specific disputed transaction. The questionnaire is designed to capture information from the cardholder and / or the issuer relating to the disputed transaction. The questionnaire may be pre-populated with previously retrieved transactional information which is stored in the case folder. Relevant documents in support of the disputed transaction may also be attached as part of the questionnaire. Various parties to the dispute may then provide relevant information (including supporting documentation) to the system. The relevant information provided by the parties is maintained in the case folder. The system then keeps track of the relevant timeframes for the case folder to ensure that each party to the dispute is given the correct period of time to respond during the processing of a dispute. Prior to filing the dispute for arbitration or compliance, the system permits the parties to resolve the dispute amongst themselves without the help of an arbiter through pre-arbitration and pre-compliance. If the parties to the dispute are unable to resolve the dispute on their own, the system also permits the parties to resolve the dispute via arbitration or compliance with the help of an arbiter. The system provides the arbiter with access to the case folder to allow the arbiter to render an informed decision on the dispute.
Owner:VISA USA INC (US)

Secure content delivery system

A secure streaming content delivery system provides a plurality of content servers connected to a network that host customer content that can be cached and/or stored, e.g., images, video, text, and/or software. The content servers respond to requests for customer content from users. The invention load balances user requests for cached customer content to the appropriate content server. A user makes a request to a customer's server/authorization server for delivery of the customer's content. The authorization server checks if the user is authorized to view the requested content. If the user is authorized, then the authorization server generates a hash value using the authorization server's secret key, the current time, a time-to-live value, and any other information that the customer has configured, and embeds it into the URL which is passed to the user. A content server receives a URL request from the user for customer content cached on the content server. The request is verified by the content server creating its own hash value using the customer server's secret key, the current time, a time-to-live value, and any other related information configured for the customer. If the hash value from the URL matches the content server's generated hash value, then the user's request is valid and within the expiration time period and the content server delivers the requested content to the user.
Owner:AKAMAI TECH INC

Authentication watermarks for printed objects and related applications

The disclosure describes systems for creating and authenticating printed objects using authentication and copy detection watermarks. For example, one verification system includes a watermark decoder and a verification module. The watermark decoder detects a copy detection watermark in a printed object to determine whether the printed object has been reproduced. The verification module processes a message decoded from an authentication watermark on the printed object to authenticate the printed object or bearer of the printed object. The authentication and copy detection watermarks may be implemented as the same or different watermarks. For example, the copy detection watermark may be a fragile watermark that carries the message and that degrades in response to a reproduction operation, such as photocopying or scanning and then reprinting the object. Alternatively, the authentication and copy detection watermarks may be separate watermarks embedded in an image that is printed on the object. The authentication watermark, in some applications, includes an identifier that links the object to a database entry with related information about the object. This related information can be used to check the bearer of the object by comparing it with attributes of the bearer (such as a user ID or photo) or the validity of the object by comparing it with attributes that are visible or machine readable on the object.
Owner:INTUIT INC

Portable monitoring unit

A sensor system that provides an adjustable threshold level for the sensed quantity is described. The adjustable threshold allows the sensor to adjust to ambient conditions, aging of components, and other operational variations while still providing a relatively sensitive detection capability for hazardous conditions. The adjustable threshold sensor can operate for extended periods without maintenance or recalibration. A portable monitoring unit working in communication with the sensor system provides immediate communication of conditions detected by the sensors. The portable monitoring unit allows building or complex management to be in communication with a sensor system at all times without requiring someone to be physically present at a monitoring site. The portable monitoring unit can be equipped with an auditory device for alerting management or a screen for displaying pertinent information regarding an occurring situation so that management can quickly identify and resolve the problem. In addition, the portable monitoring unit can also be equipped with function keys that allow the portable monitoring unit to send instructions back to the sensor system. In one embodiment, the portable monitoring unit also includes a second transceiver for communications over a short wave radio frequency, or with a cellular phone system.
Owner:GOOGLE LLC

Method and apparatus for positioning a bone prosthesis using a localization system

Methods and apparatus using a surgical navigation system to position the femoral component of a prosthetic hip during hip joint replacement surgery without separately affixing a marker to the femur. The navigation system acquires the center of rotation of the hip joint as well as at least one point on the femur in the pelvic frame of reference. From these two points, the navigation system calculates the position and length of a first line between the center of rotation of the hip joint and the point on the femur. Optionally, a second point on the femur that is not on the first line is palpated. The system can calculate the position and length of a second line that is perpendicular to the first line and that runs from the first line to the second palpated point on the femur. The prosthetic cup is implanted and its center of rotation is recorded. A tool for forming the bore within which the stem of the femoral implant component will be placed is tracked by the navigation system. While the tool is fixed to the femur, the surgeon re-palpates the same point(s) on the femur that were previously palpated. The navigation system calculates the position and length of a first line between the center of rotation of the prosthetic cup and the re-palpated first point. If a second point on the femur was re-palpated, the navigation system also calculates the position and length of a perpendicular line between the first line and the second point. The surgical navigation system uses this information to calculate and display to the surgeon relevant information about the surgery, such as change in the patient's leg length and/or medialization/lateralization of the joint.
Owner:AESCULAP AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products