Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

311results about How to "Improve identity" patented technology

Smart Parking Meter

The present invention relates to a ‘smart parking system’ comprising of 1) ‘smart parking meter’ containing a radiofrequency reader (RF reader); 2) radiofrequency tag (RF tag) containing vehicle identification information, that is mounted on vehicles; 3) a central control station communicating with a multitude of ‘smart parking meters’ to form a network; 4) the said central control station having a central computer system programmed with parking enforcement instructions. RF reader is provided with means to interrogate the RF tag of a vehicle parked in the corresponding parking stall; and transmit information obtained thereby to a central control station. The central control station has means to identify the said vehicle and determine whether or not the said vehicle is legally parked. If a parking violation is detected, the central computer system remotely instructs the corresponding ‘smart parking meter’ to issue a parking ticket. Means are also provided in the ‘smart parking system’ to determine if a vehicle parked in a parking stall has previous unpaid parking tickets. The ‘smart parking system’ also has means to determine if a vehicle wanted by law enforcement personnel is present in a parking stall within its network. According to yet another aspect, the ‘smart parking system’ has means to determine if a parking stall in its network is vacant and to reserve the said vacant stall for an authorized driver. Further, means are provided in the ‘smart parking meter’ to accept multiple forms of payment.
Owner:RATNAKAR NITESH

Relationship collaboration system

A computer implemented method of processing data containing information about relationships between contacts and a community of contact owners, comprises: collecting data including contact information, contact owner information and one or more values related to strength of a relationship between the contact and the contact owner; evaluating the strength of the relationship based on the one or more values; and storing the collected data and evaluated strength in a computer database. A method of keying a database, comprises: building a database of records, each containing information about an entity, and each of which include a domain name field; and setting the domain name field as a key field; whereby a record for an entity is found by reference to a domain name. A method of keying a database, comprises: building a database of records, each containing information about an entity, and each of which include an email address field; and setting the email address field as a key field; whereby a record for an entity is found by reference to an email address. A method of keying a database, comprising: building a database of records, each containing information about an entity, and each of which includes a field holding an identifier uniquely associated with an entity by a convention of computer networking; and setting the field holding the identifier as a key field; whereby a record for an entity is found by reference to an identifier. A method of sharing relationship information, comprising: maintaining a database of relationship information records; selecting contact information according to a selection criterion; and returning selected relationship information also complying with restrictions set in a set of hierarchical privacy policies.
Owner:THOMSON REUTERS ENTERPRISE CENT GMBH

Electronic transaction systems and methods therfeor

InactiveUS20070089168A1Facilitates nonrepudiationImprove identityComplete banking machinesFinanceAuthorizationDigital data
The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the transaction request. When the transaction request is approved by the user, the PEAD receives second digital data representing the electronic service authorization token. A remote agent server may provide a bridge between the electronic transaction system and the PEAD. In another embodiment, the private key is stored on the portable device, encrypted. The decryption key is stored outside of the device, at a trusted 3rd party location. When the user attempts to make a signature the software sends a request for the decryption key, along with the user's password or pass phrase keyed in at the keyboard of the PDA, smart phone, or cell phone, to a server belonging to the trusted 3rd party.
Owner:SERVSTOR TECHNOLOGIES LLC +1

Method and apparatus for intent prediction and proactive service offering

An intelligent IVR system identifies a customer based on previous customer interactions. Customer intent is predicted for an ongoing interaction and personalized services are proactively offered to the customer. A self-optimizing algorithm improves intent prediction, customer identity, and customer willingness to engage and use IVR.
Owner:24 7 AI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products