Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

4933 results about "Systems management" patented technology

Systems management refers to enterprise-wide administration of distributed systems including (and commonly in practice) computer systems. Systems management is strongly influenced by network management initiatives in telecommunications. The application performance management (APM) technologies are now a subset of Systems management. Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis which is now all part of APM.

Blockchain identity management system based on public identities ledger

The invention describes an identity management system (IDMS) based on the concept of peer-to-peer protocols and the public identities ledger. The system manages digital identities, which are digital objects that contain attributes used for the identification of persons and other entities in an IT system and for making identity claims. The identity objects are encoded and cryptographically encapsulated. Identity management protocols include the creation of identities, the validation of their binding to real-world entities, and their secure and reliable storage, protection, distribution, verification, updates, and use. The identities are included in a specially constructed global, distributed, append-only public identities ledger. They are forward- and backward-linked using the mechanism of digital signatures. The linking of objects and their chaining in the ledger is based on and reflect their mutual validation relationships. The identities of individual members are organized in the form of linked structures called the personal identities chains. Identities of groups of users that validated identities of other users in a group are organized in community identities chains. The ledger and its chains support accurate and reliable validation of identities by other members of the system and by application services providers without the assistance of third parties. The ledger designed in this invention may be either permissioned or unpermissioned. Permissioned ledgers have special entities, called BIX Security Policy Providers, which validate the binding of digital identities to real-world entities based on the rules of a given security policy. In unpermissioned ledgers, community members mutually validate their identities. The identity management system provides security, privacy, and anonymity for digital identities and satisfies the requirements for decentralized, anonymous identities management systems.

System for Incorporating Chance Into Interactive Games Requiring the Application of Intellectual or Motor Skills

The invention refers to digital interactive games operable from specific terminals, video game consoles, personal computers, cell phones, digital interactive television, even when they include an initial bit of chance for their usual development, in order to incorporate the possibility to get a prize (including cash payments), besides of simply diversion. It comprises the incorporation of at least one random resource capable of sustaining a mathematical balance between winners and losers equivalent to that governing games of pure chance, keeping the condition that, for the resolution of each game, it requires the participation of the person, his/her with and his/her visual, motor, spatial, and linguistic skills, besides to his/her knowledge. The incorporated random resource is managed by a probabilistic balance system that ensures the proper ratio between winners and losers in terms of the predetermined “payout”. The incorporated random resource could be either a lottery of maximum results including the previous draw of the maximum result the player can reach (although he/she plays it perfectly), or a lottery of levels of difficulty that draws the level of difficulty set for each game between a maximum level (virtually impossible to overcome) and a minimum level (very easy to overcome), or a combination of both of them.

Systems and Methods for Tracking the Status and Usage Information of a Wireless Power Transmission System

Disclosed here are methods and systems to generate and distribute information about the status and usage of a wireless power transmission system. Specifically, the present disclosure may describe a process to generate information through various software running in different components of the wireless power transmission system. Additionally, the disclosure may also include a wireless power transmission system architecture which may include components, such as a remote information service, a remote information service manager, a remote information service database, one or more authorized computing devices, and a plurality of system information generators. System information generator may refer to components, such as wireless power transmitters, computing devices/non computing devices (coupled with power receiver devices), a system management service, and distributed system database. The aforementioned components within the wireless power transmission system may be used to automatically and autonomously generate, store, transmit, and distribute system status, usage, and statistics or metrics information in order to be edited or reported by authorized and authenticated users. The information may also be used to increase the accuracy of strategic marketing, sales focus, to alert customer service of system problems and performance issues, and for billing end users.

Method and system for network management with backup status gathering

A method, system, apparatus, and computer program product are presented for management of a distributed data processing system. Resources within the distributed data processing system are dynamically discovered, and the discovered resources are adaptively monitored using the network management framework. A network or system administrator configures some mission critical endpoints with multiple network interface cards (NICs) and specifies mission critical endpoints, non-mission critical actions, etc. During status collection activities associated with network or system management activities, the categorization of an endpoint as a mission-critical or non-mission critical endpoint affects the manner in which the status collection activity is performed. Applications can request the performance of actions at endpoints without regard to the categorization of the endpoint or without regard to the categorization of the requested action, and the network management system routes the action based on whether or not the specified endpoint is a mission critical endpoint. A non-mission-critical endpoint is associated with a mission-critical endpoint based on the non-mission-critical endpoint's communication history with the mission critical endpoint. The management system may use the status of a non-mission-critical endpoint as a reflection of the status of a mission-critical endpoint.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products