Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

100 results about "Scopus" patented technology

Scopus is Elsevier’s abstract and citation database launched in 2004. Scopus covers nearly 36,377 titles (22,794 active titles and 13,583 inactive titles) from approximately 11,678 publishers, of which 34,346 are peer-reviewed journals in top-level subject fields: life sciences, social sciences, physical sciences and health sciences. It covers three types of sources: book series, journals, and trade journals. All journals covered in the Scopus database, regardless of who they are published under, are reviewed each year to ensure high quality standards are maintained. The complete list is on the SCImago Journal Rank website. Searches in Scopus also incorporate searches of patent databases. Scopus gives four types of quality measure for each title; those are h-Index, CiteScore, SJR (SCImago Journal Rank) and SNIP (Source Normalized Impact per Paper).

Server for updating location beacon database

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, periodically receive the GPS coordinates of the GPS device. While traversing the target area, detecting Wi-Fi signals from Wi-Fi access points in range of the Wi-Fi device and recording identity information of the detected Wi-Fi access point in conjunction with GPS location information of the vehicle when the detection of the Wi-Fi access point was made. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database. A user-device having a Wi-Fi radio may be located. A reference database of calculated locations of Wi-Fi access points in a target area is provided. In response to a user application request to determine a location of a user-device having a Wi-Fi radio, the Wi-Fi device is triggered to transmit a request to all Wi-Fi access points within range of the Wi-Fi device. Messages are received from the Wi-Fi access points within range of the Wi-Fi device, each message identifying the Wi-Fi access point sending the message. The signal strength of the messages received by the Wi-Fi access points is calculated. The reference database is accessed to obtain the calculated locations for the identified Wi-Fi access points. Based on the number of Wi-Fi access points identified via received messages, choosing a corresponding location-determination algorithm from a plurality of location-determination algorithms, said chosen algorithm being suited for the number of identified Wi-Fi access points. The calculated locations for the identified Wi-Fi access points and the signal strengths of said received messages and the chosen location-determination algorithm are used to determine the location of the user-device. The database may be modified with newly added position information to improve quality of previously determined positions, and error prone information is avoided.
Owner:SKYHOOK WIRELESS

System and Method of Mobile Anti-Pharming and Improving Two Factor Usage

A variant of phishing involves subverting an Internet access point, often used for mobile computing. Malware can route user requests for bank websites into a phisher's private network, with fake bank websites (pharming). The user can have a “mobile password” at the bank. When she connects from an access point, she sends a hash, found from the password, starting at some position in it. The bank returns a hash, found from the same password, starting at another position in it. Each can verify the other. We protect both from a man in the middle attack. By hashing a web page and the mobile password, and inserting the hash into the page that is sent, the recipient can verify that the page is untampered. We use an anonymizer, external to the access point. A user pre-establishes a password with the anonymizer. At the access point, she and the anonymizer use a zero knowledge protocol to verify each other, based on the password. Then, the password encrypts communication between them. From the anonymizer, she logins elsewhere. The anonymizer is our man in the middle, to defeat a man in the middle attack. W extend earlier antiphishing methods, to attack pharms for non-existent banks, or that are unauthorized websites for actual companies. We show how to use a plug-in to let websites share several two factor implementations. This reduces the cost and inconvenience to consumers, who might otherwise have to carry and use a different two factor gadget, for each of their bank accounts or other corporate websites that mandates the usage of two factor authentication. By expanding the scope of two factor usage, we improve the security of e-commerce, without having to use a public key infrastructure.
Owner:METASWARM INC

Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data

InactiveUS20050135613A1High data rate compressionAudio/video qualitySecret communicationProgram/content distribution protectionEncryptionCopying
Devices and methods for generating encrypted data, for playing encrypted data and for re-signing originally signed encrypted data are based on the encrypted data, apart from the encrypted media information, to include the information required for decrypting the data and additionally a signature of who has generated the encrypted data. Thus the origin of the encrypted data can be traced back. In particular, passing on the encrypted data to a limited extent by the producer of the *encrypted data, for example to friends or acquaintances, is allowed, while only a mass reproduction of the encrypted data is considered as pirate copying. The pirate copier can, however, be found out with the help of the signature, wherein the signature is optionally protected by an embedded watermark signature. Because this is a concept wherein, when being used legally, only encrypted data occur, the unauthorized removal of the encryption is a statutory offence. The inventive concept makes possible finding the offender and at the same time considers ownerships of the operators with regard to a limited passing-on of media information, and thus has the potential of being accepted on the market.
Owner:FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG EV

System and method for an online catalog system having integrated search and browse capability

InactiveUS20060095345A1Extend or refine their search or browsing activityCommerceSpecial data processing applicationsLevel of detailSQL
A system and related techniques generate and maintain a unified product index, to perform searching and browsing in an online product, service, content or information catalog. A user investigating, for example, a set of retail offerings of digital cameras may for instance browse through a Web site layout or taxonomy to locate products of interest, such as cameras having resolution in the range of 3-4 megapixels or in the price range of $200-300. Alternatively, the user may input search terms in a search dialogue box to locate those or other features. Unlike conventional e-commerce platforms in which search may be performed against structured databases while browsing may access unstructured HTML or other descriptive material, according to the invention navigation and searching may be integrated and both access a structured index derived from product descriptions as well as traditional SQL or other structured data. A user may thus transparently move between browsing the Web site and searching the Web site, refining their search or browsing activity in a seamless fashion. The HTML or other unstructured data may in one regard be processed by an index engine to identify product attributes such as type (electronics), size, price, weight or other specifications as well as attribute values, which may be sorted or stored in a separate table. A set of results generated by conducting an initial search may thus be continued or refine by further browsing down to a particular product or other level of detail. Conversely a user who has browsed to a given level of detail, such as digital camcorders priced less than $700, may initiate a search through products at that level of the hierarchy without resetting search terms or position in the taxonomy. Greater ease of use, more efficient location of products or services and less dead-end pathways are thus achieved.
Owner:MICROSOFT TECH LICENSING LLC

Systems and methods for transacting business over a global communications network such as the internet

A business model/process is described for conducting business transactions over the Internet, allowing buyers to reduce the price of the selected product/service based on the buyer's performance during a collateral activity. Sellers offer the product/service within a specified price range, and buyers accept the offer, in exchange for the opportunity to close the transaction at the lowest price offered by achieving a high score or performance rating during the collateral activity. The ultimate price is within the agreed upon range, but is determined based upon the buyer's performance and scaled to the performance at the collateral activity. The price may change throughout performance of the collateral activity, and the available price at any given time may be displayed or otherwise made available to the buyer. The price change may be continuous, at intervals, in response to certain events, etc. The activity may be a video game, electronic board game, sports bet, card game, or any other activity, and may be performed against the seller, a pre-programmed software opponent, a computer opponent, another buyer competing for the same or a different product, a player participating as a player only and not as a buyer, or anyone or anything else. The seller will receive payment for listing products for sell, and as the products attracts buyers to participate in PDAs and compete for lower prices, revenues will be generated from the time spent by the buyers during the PDAs, the time can turn into advertisement revenues for the host of the web site, and the revenue can be shared accordingly with the sellers.
Owner:PERFORMANCE PRICING INC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products