Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4051 results about "Recipient side" patented technology

Method for authorizing in data transmission systems

The invention relates to a method and to a device for the authorization in data transmission systems employing a transaction authorization number (TAN) or a comparable password. According to a first step, the user sends a qualifying identification of the data input apparatus together with a request for the generation or for the selection of a transaction authorization number TAN or of comparable password from a data file from the data input apparatus to an authorization computer. In a second step the authorization computer generates the transaction authorization number TAN or the comparable password or selects them form a data file. According to a third step, the authorization computer sends the transaction authorization number TAN or the comparable password over a second transmission path different from the first transmission path to a monitor, for example a pager. According to a fourth step, the user reads this transaction authorization number TAN or the comparable password from the receiver and enters the transaction authorization number TAN or the comparable password into the data input apparatus. According to a fifth step, this transaction authorization number TAN or the comparable password is transmitted to the authorization computer. According to a sixth step, the authorization computer verifies the validity of the transaction authorization number TAN or of the comparable password in order to establish or switch free, according to a seventh step, a connection between the data input apparatus and the receiver unit.
Owner:SCHMITZ KIM

Network configured for delivery of content for download to a recipient

Network systems and processes for delivery of electronic content to recipient processors may be configured to facilitate the delivery of relatively large content items and / or a relatively large number of content items. In one example, a movie rental system and process delivers (downloads) movie files to customers across the Internet. System network architecture includes three or more layers of servers, including a main server supporting an interface for recipient processors to request content items, a plurality of parent servers, and a plurality of edge servers. Edge servers are distributed throughout a region in which the system provides content delivery services to recipient processors. Parent servers, spaced across the service region, support edge servers. A copy of each content item available through the service is distributed from the main server to each parent servers for storage. Parent servers distribute content to edges servers, pursuant to instructions from the main server or requests from the edge servers. The main server receives and processes requests for content items from recipient processors and directs recipient processors to edge servers for obtaining requested content items. The main server also authenticates licenses and publishes rules for the distribution of content items.
Owner:BLOCKBUSTER LLC

Digital Content Protection Method and Apparatus

<heading lvl="0">Abstract of Disclosure</heading> Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resistant device communicates with another of the computational units acting as an interface control processor, and serves to protect the contents of a nonvolatile memory from unauthorized access or modification by other portions of the tamper-resistant device, while performing cryptographic computations using the memory contents. Content providers enforce viewing privileges by transmitting encrypted rights keys to a large number of recipient devices. These recipient devices process received messages using the protected processing environment and memory space of the secure unit. The processing result depends on whether the recipient device was specified by the content provider as authorized to view some encrypted digital content. Authorized recipient devices can use the processing result in decrypting the content, while unauthorized devices cannot decrypt the content. A related aspect of the invention provides for securing computational units and controlling attacks. For example, updates to the nonvolatile memory, including program updates, are supported and protected via a cryptographic unlocking and validation process in the secure unit, which can include digital signature verification.
Owner:CRYPTOGRAPHY RESEARCH

Traffic information providing system,traffic information expression method and device

The invention provides a traffic information display method which presents traffic information so as to quantatively indicate the reliability and superiority of traffic information. The invention also provides a traffic information providing system which clearly communicates an “unknown” section to the receiving party. The invention represents the state volume of traffic information by the state volume of each sampling point set by segmenting a target road and represents traffic information by using the state volume of traffic information and gray scale information which displays the reliability of the state volume in multiple levels. The user thus understands how reliable the traffic information is and properly evaluates the traffic information. The traffic information may be used to perform a high-accuracy path search and provide traffic information at a reasonable cost. The traffic information providing system of the invention includes traffic information providing apparatus for providing, as traffic information, the state volume of traffic information of each distance quantization unit set by segmenting a target road and mask bit information indicating that the state volume is valid or invalid, and traffic information utilization apparatus for reproducing a valid state volume by using the mask bit information. In the traffic information providing system, the receiving party clearly recognizes, based on the mask bit information, an “unknown” section enclosed by an ellipse:
Owner:PANASONIC CORP

Method and system for enhanced electronic mail processing

InactiveUS20060168057A1Improved electronic mail deliverabilityMultiple digital computer combinationsData switching networksProxy serverTransfer agent
An asynchronous proxy server system interposed between sender and recipient mail transfer agents, or other agent on the sender side, is configured to classify outgoing mail. Message and message header information is processed and compared against a set of business rules. The message header is modified to reflect an assertion based on an outcome of the comparison. The modified outgoing message is then routed to its destination.
Owner:HABEAS

Systems and methods for providing and updating a unified client

InactiveUS20110126192A1Improved end user experienceImprove experienceProgram loading/initiatingMemory systemsClient-sideReceipt
The present invention is directed towards systems and methods for more efficiently managing installation of a plurality of application plug-ins for a client device. A client device executes, upon startup, a receiver application. The receiver application may manage installations of application plug-ins for a user of the client device. The receiver application may receive from an update server a delivery of application plug-ins to install on the client device. Upon receipt of the delivery, the receiver application may automatically install each of the application plug-ins on the client device transparently to the user of the client device. The receiver application may automatically start each of the application plug-ins.
Owner:CITRIX SYST INC

Digital telecommunication system with selected combination of coding schemes and designated resources for packet transmission based on estimated transmission time

The present invention relates to a method and an arrangement for communicating packet information in a digital telecommunications system. Through the invention is selected a set of designated communication resources (ch1-chn) from an available amount of resources. Every packet (P) is forward error correction encoded into an encoded packet (Pci), via one of at least two different coding schemes (ci), prior to being transmitted to a receiving party, over the designated communication resources (ch1-chn). An estimated transmission time is calculated for all combinations of coding scheme (ci) and relevant distribution (dj) of the encoded data blocks (B1-BΓ), in the encoded packet (Pci) over the set of designated communication resources (ch1-chn), and the combination (ci,dj) is selected, which minimises the estimated transmission time.
Owner:TELEFON AB LM ERICSSON (PUBL)

Technique for ethernet access to packet-based services

An Ethernet Metropolitan Area Network (10) provides connectivity to one or more customer premises (161,162,163) to packet-based services, such as ATM, Frame Relay, or IP, while advantageously providing a mechanism for assuring security and regulation of customer traffic. Upon receipt of each customer-generated information frame (20), an ingress Multi-Service Platform (MSP) (122) “tags” the frame with a customer descriptor (22′) that specifically identifies the recipient customer. In practice, the MSP tags each frame by overwriting the Virtual Local Area Network (VLAN) identifier (22) with the customer descriptor. Using the customer descriptor in each frame, a recipient Provider Edge Router (PER) (18) or ATM switch can map the information as appropriate to direct the information to the specific customer at its receiving site. In addition, the customer descriptor (22′) may also include Quality of Service (QoS) information, allowing the recipient Provider Edge Router (PER) (18) or ATM switch to afford the appropriate QoS level accordingly. Each Ethernet switch may advantageously overwrite the VLAN identifier at an incoming port with a second tag associated with an egress port to increase the scale associated with single switch.
Owner:AMERICAN TELEPHONE & TELEGRAPH CO

Method and system for monitoring email and website behavior of an email recipient

A system for monitoring email and website behavior of an email recipient is provided. According to one exemplary embodiment, the system includes a mail enhancement server and a logging server. The mail enhancement server is configured to intercept all outgoing emails from a mail server. The mail enhancement server then modifies each outgoing email to include a tracking code. The tracking code is embedded in an image call which in turn is also inserted into the outgoing email. If the outgoing email contains hyperlinks, each hyperlink is also modified to include the tracking code. The tracking code is uniquely associated with the outgoing email. The image call (and the tracking code) is used to detect when the recipient of the outgoing email has opened that email. The tracking code, when embedded in a hyperlink, is also used to monitor whether the recipient has opened the email and/or clicked through on one or more of the hyperlinks in the email. The logging server associates a cookie with the recipient of the outgoing email. When the logging server receives an image call, the corresponding image and the cookie are concurrently delivered to the recipient. The cookie is used to monitor the behavior of the recipient at a website, regardless of how the recipient arrives at that website, be it through a click-through from the email or otherwise. The logging server is configured to capture and store relevant information relating to the outgoing email thereby allowing the sender of the outgoing email and the recipient to be linked and the behavior of the recipient to be monitored via the tracking code, the image call and the cookie.
Owner:XANT INC

Packet format

The present invention relates to packet construction of format for communications across multiple access networks such as wireless local area networks (WLAN). The present invention provides a device for use in a wireless network and comprising means for generating a packet comprising a first portion having a destination address and preferably a network duration identifier for a recipient device in the network, and a second portion; and means for transmitting the first portion at a predetermined coding and / or modulation rate, and means for transmitting the second portion at a higher coding and / or modulation rate.
Owner:KK TOSHIBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products