Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1115 results about "Search function" patented technology

Runtime adaptable search processor

ActiveUS20060136570A1Reduce stacking processImproving host CPU performanceWeb data indexingMultiple digital computer combinationsData packInternal memory
A runtime adaptable search processor is disclosed. The search processor provides high speed content search capability to meet the performance need of network line rates growing to 1 Gbps, 10 Gbps and higher. he search processor provides a unique combination of NFA and DFA based search engines that can process incoming data in parallel to perform the search against the specific rules programmed in the search engines. The processor architecture also provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and/or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

Runtime adaptable search processor

A runtime adaptable search processor is disclosed. The search processor provides high speed content search capability to meet the performance need of network line rates growing to 1 Gbps, 10 Gbps and higher. The search processor provides a unique combination of NFA and DFA based search engines that can process incoming data in parallel to perform the search against the specific rules programmed in the search engines. The processor architecture also provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. Further, a runtime adaptable processor is coupled to the protocol processing hardware and may be dynamically adapted to perform hardware tasks as per the needs of the network traffic being sent or received and / or the policies programmed or services or applications being supported. A set of engines may perform pass-through packet classification, policy processing and / or security processing enabling packet streaming through the architecture at nearly the full line rate. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. Scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to / from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer. A security system is also disclosed that enables a new way of implementing security capabilities inside enterprise networks in a distributed manner using a protocol processing hardware with appropriate security features.
Owner:MEMORY ACCESS TECH LLC

Speech controlled access to content on a presentation medium

One embodiment of the invention provides television viewers with an intuitive and easy-to-use way to find the programs they want and to control their television viewing experience. In a further embodiment, a speech control interface, in combination with a variety of search functions, is provided such that television viewers have an intuitive and easy-to-use way to find the programs and information they want. The invention also provides the use of personalization as a way to filter and deliver relevant content and services to users based upon individual preferences. Another aspect of the invention provides a hierarchical user interface for speech-controlled, interactive applications, that gives television viewers an intuitive and easy-to-use way to find the programs they want and to control their television viewing experience. The invention also provides a method and apparatus where the channel lineup in a television service is dynamic and changeable, i.e. the list of available channels can be modified, in real time, to suit the preferences and usage of a particular subscriber. Further, the invention provides a method and apparatus that addresses the use of speaker, group, language, or emotional state identification systems to target advertising, to users who are or are not enrolled in a speaker ID system.
Owner:PROMPTU SYST CORP

Personal helper bot system

MyBOTS.Tv—the personal helper BOT system utilizes a customizable personal assistant in the form of an avatar to engage its owner in a conversational manner with natural language commands to coordinate activity of a team of autonomous helper BOTs. Among a variety of other tasks, BOTs, which are software applications that run automated tasks over the Internet, collaborate to create the owner's schedule, maintain his/her to-do list, obtain personally interesting information, provide personalized services and searches, perform web site transactions, use all types of web apps, complete tasks and/or synthesize useful products for their owners.
In some embodiments, the helper BOTs system leverages Digital Library (DL) Architectures to house elements that they intelligently serve. The underlying Digital Library Architecture features an induction process that elicits facts about incoming elements that can be judged by a panel of agents. Agents judge elements according to areas of discretion which are of interest to the consumer population. The judgments are then stored as part of each element's metadata. Helper BOTs then deliver the elements intelligently by probabilistically ranking, sorting, classifying, and/or presenting and serving them to users in accordance with value preferences indicated in their profiles. One such embodiment, (which has been previously published as a Virtual Knowledge Architecture for Interactive Television) ranks and serves TV programs to people based on the value preferences set in their profile(s).
In other embodiments, helper BOTs leverage user-directed search paradigms to refine and customize the search function according to the searcher's preferences, style and demographic information. In these embodiments, helper BOTs are directed by way of a search construction wizard to return search results in accordance with searcher profiles and demands such as language, context of content, age of document, and age appropriateness. In this regard, searcher preferences refer not only to the search itself, but to the style, presentation, and appropriateness of the search results which can not only be a list of links but delivered as synthesized living document products incorporating new media elements.
Some helper BOT embodiments will help people to perform financial transactions requiring highly sensitive and personal information such as credit card numbers, bank account information and the like. These embodiments require the use of BOT security. BOT security will utilize x.509 digital certificate technology assigned to the avatar by its human owner. The cryptographic key will be utilized to perform all related transactions and protect any information deemed sensitive on behalf of its owner in a secure manner through secure network tunnels.
Further embodiments enable an extensible set of commercially available BOTs to be obtained on the MyBOTs.Tv web site in the BOTS Store. This has begun with the 12 “EmBOTiments” presented here. These BOTs perform individual tasks autonomously but may also work in collaboration with each other. Each BOT processes inputs and can be parameterized. Hence, a BOT API enables the creation of stored programs that capture the teamwork interaction and makes their function re-usable. An extensible grammar makes it possible for the evolving baseline of useful stored programs to be called by name so that BOT teams can be dispatched by the user's avatar on demand.
Owner:BARRETT BERTRAND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products