Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1373results about "Special data processing applications" patented technology

Room key based in-room player tracking

A disclosed authentication instrument is used to authorize various services at a hotel-casino complex, such as but not limited to in-room gaming, in-room sports wagering, room access, safe access, mini-bar access, Electronic Fund Transfers (EFT), player tracking services and in-room entertainment services (e.g., video games and movie channels). A smart card, an electronic token and a magnetic striped card are examples of hardware that may be used as authentication instruments. For in-room gaming, the authentication instrument may be used to authorize, in a secure and legal manner, in-room game play sessions on an entertainment terminal connected to a remote gaming machine.
Owner:IGT

Methods for combating malicious software

ActiveUS20090077664A1Memory loss protectionError detection/correctionCausal treeData segment
A method for combating malware monitors all attempts by any software executing on a computer to write data to the computer's digital storage medium and records details of the attempts in a system database having a causal tree structure. The method also intercepts unauthorized attempts by executing objects to modify the memory allocated to other executing objects or to modify a selected set of protected objects stored on the digital storage medium, and may also intercept write attempts by executing objects that have a buffer overflow or that are executing in a data segment of memory. The method may include a procedure for switching the computer into a quasi-safe mode that disables all non-essential processes. Preferably, the database is automatically organized into software packages classified by malware threat level. Entire or packages or portions thereof may be easily selected and neutralized by a local or remote user.
Owner:ROBOT GENIUS

Dynamic identification and administration of networked clients

ActiveUS7568018B1Data resettingMultiple digital computer combinationsSubject matterDistributed computing
The present inventive subject matter relates to networked computing environments and more specifically to dynamic identification and administration of networked clients. Various embodiments of the present inventive subject matter include systems and methods for defining, on a server, a configuration of interest comprising one or more potential properties of a client, communicating the configurations of interest over a network to one or more clients, dynamically evaluating a client state relative to the configurations of interest, and communicating a representation of the client state in relation to the configuration of interest to the server. Further embodiments include automatically creating and displaying associations of clients based on configurations of interest. Yet further embodiments include clients requesting and receiving updates to the configurations of interest. Still further embodiments include actions associated with configurations of interest. Such actions, in various embodiments, include performing administrative actions on various networked clients.
Owner:NEW BOUNDARY TECH

Method and apparatus for providing group calls via the internet

Method and apparatus for implementing group calling are disclosed. In one embodiment, the method includes displaying a service provider, a service provider rate for communicating with the service provider, and a real-time indication of whether the service provider is available. The method may further include receiving a request from a first customer to communicate with the service provider and connecting the first customer to the service provider through a link capable of transmitting from the service provider to the first customer. The method may also further include receiving a request from a second customer to communicate with the service provider and connecting the second customer to the service provider through a link capable of transmitting from the service provider to the second customer while the first customer is coupled to the service provider.
Owner:THRYV INC

Interactive multi media user interface using affinity based categorization

InactiveUS7284202B1High communication latencyTelevision system detailsDigital data information retrievalThe InternetE-commerce
Computing devices capable of internetworking and receiving, storing and viewing programmed (scheduled) television and multimedia content provide a platform for access to a combination of Internet and Television content and services. On this platform, a mix of pre-scripted and live interactive dialog (chat with offered responses) are broadcast by a connected server or servers to provide supplemental entertainment, information regarding programmed content, enhancements to scheduled television advertising, a community experience, and an interface to Internet applications and services. The dialog provides a “Social Interface” allowing fictional and non-fictional characters to interact with viewers. The fictional and non-fictional characters are each emblematic of a specific affinity group categorization, which a user personally identifies with and is drawn to. Selection of an affinity character also provides a filter for selecting internet and broadcast content associated with that character. Second level content is also associated with and mediated by each character. This provides e-commerce opportunities whereby sponsors can direct advertising content based upon factors such as the relative popularity of each character or the demographic group associated with each character.
Owner:MICROSOFT TECH LICENSING LLC

Method and apparatus for data retention in a storage system

ActiveUS20050125411A1Digital data information retrievalMemory loss protectionRetention periodSoftware engineering
A system and method are provided for retention of data on a storage system. An application program provides the storage system with data to be stored on the storage system. The application program also provides the storage system with a retention period that indicates a period of time for which the data may not be deleted. When the storage system receives a request to delete the data, it first evaluates the retention period associated with that data to determine if the retention period has expired. If the retention period has not expired, the storage system denies the request to delete the data.
Owner:EMC IP HLDG CO LLC

Method and apparatus for providing network security using security labeling

ActiveUS20050097357A1Reduces potential leakageImprove network securityDigital data processing detailsMultiple digital computer combinationsNetwork security policySecurity level
A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.
Owner:CISCO TECH INC

System and process for network collaboration through embedded annotation and rendering instructions

ActiveUS20030023679A1Requires applicationCathode-ray tube indicatorsNatural language data processingWeb browserMessage delivery
A process for network collaboration using embedded annotations and rendering instructions allowing collaborators to generate, share, and render collaborative content over the internet without installing any applications other than a web browser is disclosed, which allows the recipients of such collaborative content to view the content without installing any application other than the web browser. The message containing collaborative content sent between collaborators is a URL and collaborative content elements, which not only contain the identity of the base document, but an encoded representation of the collaborative content itself. These URLs are self-contained, and can be distributed using synchronous or asynchronous messaging systems.
Owner:EPLUS CAPITAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products