Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1285 results about "Web access" patented technology

Geographic based communications service

A geographic based communications service system that includes a network and a plurality of access points connected to the network and arranged at known locations in a geographic region. One or more service providers or information providers may be connected to the network to provide services or information on the network. A mobile user (MU) may use a portable computing device (PCD) to connect to the network and access information or services from the network. The PCD may be configured to transmit a signal indicating a presence of the PCD as well as identification information indicating the mobile user. Upon detection of the wireless signal by a first access point in proximity to the PCD, and upon receipt of the identification information indicating the user of the PCD, the first access point may transmit the identification information, as well as the known geographic location of the first access point, to one or more providers on the network. The known geographic location of the first access point indicates the approximate location of the PCD of the mobile user. A first information provider may receive this information and provide content information or services to the mobile user. For example, the first information provider may select content information dependent upon the known geographic location of the first access point and demographic information or past activities of the mobile user of the PCD. The first information provider may then provide the selected content information through the network and through the first access point to the PCD of the mobile user.
Owner:WAYPORT

System and method for network traffic management and load balancing

A method for providing load balancing and failover among a set of computing nodes running a network accessible computer service includes providing a computer service that is hosted at one or more servers comprised in a set of computing nodes and is accessible to clients via a first network. Providing a second network including a plurality of traffic processing nodes and load balancing means. The load balancing means is configured to provide load balancing among the set of computing nodes running the computer service. Providing means for redirecting network traffic comprising client requests to access the computer service from the first network to the second network. Providing means for selecting a traffic processing node of the second network for receiving the redirected network traffic comprising the client requests to access the computer service and redirecting the network traffic to the traffic processing node via the means for redirecting network traffic. For every client request for access to the computer service, determining an optimal computing node among the set of computing nodes running the computer service by the traffic processing node via the load balancing means, and then routing the client request to the optimal computing node by the traffic processing node via the second network.
Owner:YOTTAA

System and method for recording a presentation for on-demand viewing over a computer network

A system and method for recording and playback of a live presentation that enables a reproduction of audio and visual aspects of the live presentation and enables on-demand viewing of the presentation at a later time. A live presentation comprising a plurality of presentation slides, audio content, and optionally, visual content are recorded as a data stream, so that when the recording of the data stream is played, the presentation slides are displayed in substantial synchrony with reproduced audio and visual content on a viewer's computer, thereby reproducing the live presentation. The plurality of presentation slides are saved as HTML files to a predetermined location that is accessible by the viewer's computer over a computer network, such as the Internet. During the presentation, the live audio and visual content is captured and encoded into the data stream, which is in an active streaming format (ASF), and the data stream is saved to a file. Also, slide display commands produced in conjunction with the display of the presentation slides during the presentation are interleaved into the data stream. In response to a viewer's request to view the presentation at a later time, the data stream file is downloaded to the viewer's computer and played back using a media player, which decodes the data stream file to replicate the live audio and visual content of the presentation. As the slide display commands are encountered during playback of the data stream file, corresponding HTML slide files are downloaded over the computer network to the viewer's computer and displayed so that they are substantially synchronized with the reproduced audio and visual content of the presentation.
Owner:MICROSOFT TECH LICENSING LLC

System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning

The present invention provides a system and method for predicting and preventing unauthorized intrusion in a computer configuration. Preferably, the invention comprises a communication network to which at least two computing devices connect, wherein at least one of the computing devices is operable to receive data transmitted by the other computing device. The invention further comprises a database that is accessible over the network and operable to store information related to the network. A vulnerability assessment component is provided that is operable to execute a command over the communication network, and a data monitoring utility operates to monitor data transmitted over the communication network as the vulnerability assessment component executes commands. Also, an intrusion detection component is included that is operable to provide a simulated copy of the network, to generate a first data transmission on the simulated copy of the network that represents a second data transmission on the communication network, and to compare the first data transmission with a second data transmission. The vulnerability assessment component preferably interfaces with the intrusion detection component to define rules associated with the first and second data transmissions, to store the rules in the database, and to retrieve the rules from the database in order to predict and prevent unauthorized intrusion in the computer configuration.
Owner:PACE UNIVERSITY

Method and system for granting access to personal information

A system and method to permit users to have personal unique identifiers associated with personal information stored on a database accessed by an identity server is disclosed. The identity server is connected to one or more networks including the Internet. Users can distribute the personal unique identifier to third parties who can then obtain the personal information by accessing the server through the network. The users may modify the information stored in the database, which can then assist third parties in obtaining the modified information by inputting the personal unique identifier, or permitting client software to do so automatically on their behalf, in turn making updates to that information for the third party. This can be done over a large period of time such that third parties can easily access personal information of the user even if that information changes. The third parties may also be organizations or corporations with extensive customer lists that wish to update their client contact information with minimum interference to the customers and at minimal costs to the organization. Furthermore, users can use the personal unique identifier to populate electronic forms, such as web forms, provided on web sites hosted by organization or corporation, for the convenience of the organization or corporation and the use. The personal information of the user may also be organized in different cards having a variety of reveal and hidden status levels permitting access to additional information if a key, comprising an alphanumeric code, is entered together with the unique identifier.
Owner:ANDERSON TERRY PAUL +1

System and method for the composition, generation, integration and execution of business processes over a network

A system and method providing an environment for the composition, generation, integration and execution of business processes and / or transactions over a distributed computing-based network. In a preferred embodiment, a business process expert develops a business model by using a network browser to access the composition environment via the network. The preferred embodiment includes a Composer and a Player. The Composer allows a business process engineer to model the processes, process rules and data structures of an entity upon the basis of a plurality of software resources. The Player executes the modeled processes and access relevant data in real-time, according to rules and resources as related within a software structure generated by the business process engineer. The preferred embodiment dynamically constructs web pages based on the process, rule and data definitions prepared by a business process engineer / expert and does so through a Process Interpreter and Grammar Engine so as to encapsulate all the software resources necessary to complete the desired business process without the need of people programming, scripting or coding. Pages are constructed only when required, ensuring that the solutions are flexible, error free and based upon the most current business practices, providing agile, integrated, error free and real-time software solutions capabilities.
Owner:AVOLIN LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products