Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

365 results about "Retargeting" patented technology

In software engineering, retargeting is an attribute of software development tools that have been specifically designed to generate code for more than one computing platform.

Sender- specified delivery customization

A system and method that enables a given sending user to specify a set of delivery policies and have them used for the electronic delivery of a given message, the message potentially having several heterogeneous parts (e.g., text and pictures) each of which is handled differently, and delivered to multiple heterogeneous devices (e.g., PCs, Smartphones, fax machines), and possibly to several distinct recipients. The factors with which a sender can qualify their delivery policies include: time / date, transmission cost; whether the transmission can be forwarded; receiving device capability; and network reliability, speed, and security transmission. Methods are also provided enabling a sender to specify that particular transmissions be redirected or copied, e.g., "send fax copy to my broker and my accountant." In one embodiment, the delivery policies may be specified using PICS.
Owner:SNAP INC

Associating data with images in imaging systems

A reference to auxiliary data is steganographically encoded within a media signal. The auxiliary data is stored in a metadata database that maps the reference encoded in the media signal to its corresponding metadata. Various application programs and devices can access the metadata by extracting the reference from the media signal, and querying the database for metadata corresponding to the reference. The metadata database may be implemented in a network server to make metadata readily available to devices and applications distributed throughout a network. This steganographic link to metadata may be used to retrieve metadata across media management systems. In one configuration, for example, media management systems have metadata servers that maintain metadata for a collection of media signals. The metadata server is responsible for responding to requests for metadata associated with media titles in its collection. In the event that a metadata server does not have metadata associated with a particular media title, it forwards the reference extracted from the media signal to a metadata router, which in turn, re-directs the request to the appropriate metadata server.
Owner:DIGIMARC CORP +1

System and method using interpretation filters for commercial data insertion into mobile computing devices

The present invention teaches a method to alter browser programming responses by the substitution of certain client-server communications commands allowing certain browser requests to be redirected to alternate servers for further interpretation and subsequent server responses. The purpose of this method is injection of custom content into browser-based device displays without disruption of the original page content. This method accomplishes the task without requiring additional plug-in applications, browser or client device code modifications. The invention teaches the use of a local proxy server or embedded device but also claims the use of remote network proxy servers to transparently alter the command request sequence of the client browser in order to request alternate information other than that normally requested by the browser for interpretation and display. The present invention also teaches how to identify web publishers or domain owners for registration notification and possible financial compensation.
Owner:DYE THOMAS A +1

Proxy based adaptive two factor authentication having automated enrollment

A method of and system for adding strong authentication to an existing network based application. A proxy based monitoring process screens data sent to and from a client application and intercepts login requests. These intercepted requests are redirected to an authentication process which first checks to see if the user logging in has enrolled in strong authentication. If not enrolled, the user is allowed to continue with a normal login. If enrolled, the user is authenticated by requesting digital identification data, such as a digital certificate, from the user's computer. If authentication succeeds, the user is allowed to proceed on to the normal login process. If authentication fails, the login attempt is blocked. User enrollment is automated, requiring no user interaction beyond the initial request. Verification for purposes of issuing a digital certificate, or other identifying data, is by means of confirming that the user being enrolled is currently logged in to the client application.
Owner:LIU GOUPING

Method and apparatus to manage network client logon scripts using a graphical management and administration tool

A GUI (Graphical User Interface) Manager is used by a network administrator to fill-in predefined templates. The administrator does not need to compile, debug or write a single line of scripting code. The GUI manager has a “select the box” and “point and click” and “fill-in the blank” approach for selecting computer settings. The predefined configuration and / or template(s) are used by a logon script program on a client system to manage the configuration of resources on at least one client. There are three levels of resources that can be managed. The first type of resource is an operating system. The second type of resource is an application resource. And the third type of resource is to redirect a resource on the client to a resource on a network such as a drive letter mapping. Resources include configurations from the group of configuration settings consisting of drive mappings, shell folders, printer deployment, proxy server access, application paths, service packs, anti-virus updates, policies and automatic mail profile creation. In another embodiment, validation logic is used on the clients' system during the execution of an application program that takes the template and applies the defined configuration settings in the template to the clients' system so as to automatically configure at least one configuration setting for a user if the combination of one or more predefined conditions for a selected group, a selected operating system and a selected connection method are met. In still another embodiment, an interpretive engine is used on the client's system to permit the administration of client resources with a template while also allowing network administrators to build their own custom logon scripts.
Owner:QUEST SOFTWARE INC

System and method of threat detection under hypervisor control

A computing device is described that comprises one or more hardware processors and a memory communicatively coupled to the one or more hardware processors. The memory comprises software that, when executed by the processors, operates as (i) a virtual machine and (ii) a hypervisor. The virtual machine includes a guest kernel that facilitates communications between a guest application being processed within the virtual machine and one or more virtual resources. The hypervisor configures a portion of the guest kernel to intercept a system call from the guest application and redirect information associated with the system call to the hypervisor. The hypervisor enables logic within the guest kernel to analyze information associated with the system call to determine whether the system call is associated with a malicious attack in response to the system call being initiated during a memory page execution cycle. Alternatively, the hypervisor operates to obfuscate interception of the system call in response to the system call being initiated during memory page read cycle.
Owner:FIREEYE SECURITY HLDG US LLC

Dynamic document context mark-up technique implemented over a computer network

A technique is disclosed for generating markup information to be displayed on a client computer system. The client system includes memory configured to store at least one update file which comprises keyword information relating to keywords suitable for markup. In one implementation, the update file is generated at a remote server system and downloaded to the client system. When a new document (e.g. a web page) is displayed on the client system to an end user, selected context associated from the document is analyzed for selected keywords. In a specific implementation, the selected keyword information is provided by an entity other than the end user. Using the selected keyword information, specific context in the document is selected to be marked up. According to a specific embodiment, the selection of the document context to be marked up may be performed at the client system. Markup operations are then implemented at the client system on at least a portion of the selected document context, thereby resulting in marked up document context which has a visual appearance that is different than the appearance of the initial parsed context. Additionally, a pop-up advertisement may be automatically displayed on the client system based upon the identified context in the document. When the user clicks on a portion of the marked up document context, the user may be redirected to a target URL which was not included as part of the initial parsed document context. Alternatively, a pop-up window or layer which includes a plurality of different links may be displayed to the user.
Owner:AMOBEE

Method and system for enhanced Web page delivery and visitor tracking

InactiveUS20060248452A1Enhancing web page deliveryReduce deliveryWebsite content managementMarketingWeb siteWeb traffic
A system for and method of enhancing web page delivery and visitor tracking. The invention provides the ability to control redirection of Web traffic of humans. It can identify visitors to a Web page, track their movements, log critical information, and analyze the Web traffic in order to judge the success in driving quality traffic to some known goal on a Web site, such as a sale. The system tracks visitors via use of redirection with an image tag. The invention can also use unique image marker references to prevent browsers from accessing cached images.
Owner:THRYV INC

Method, computer program product, and system for non-blocking dynamic update of statically typed class-based object-oriented software

Under the present invention, a method, computer program product, and system for non-blocking dynamic update of statically-typed class-based object-oriented software executing as byte-code on a virtual machine within an actively running computer system is provided. A set of objects instantiated from an existing module or multiple modules (identifiable collections of application resources and class definitions in the form of byte-code representations) is ready for execution on a virtual machine in an actively running computer system. New versions of one or more modules corresponding to those already loaded into the actively running virtual machine are dynamically loaded into the virtual machine for the purpose of updating the running software. The class definitions within the loaded modules are prepared for dynamic update by inserting byte-code that enables; transparent state transfer and shared object identity between objects of a former version and the new version of a class. On the event of a software update, the objects instantiated from a former version of an updated class become un-initialized surrogate objects with the potential to redirect to their future corresponding objects. Corresponding objects are created lazily on first access of the declaring class members. Besides lazy redirection of the behavior of objects and classes, non-blocking dynamic update is achieved by lazy migration of the state of former objects and classes while locking on a temporary field access lock. Thus, the algorithm for controlling field access and state migration is completely lock-free both before and after state migration; hence the performance degradation is minimal. Finally, any unreferenced objects are removed from memory.
Owner:ZEROTURNAROUND

User Location Dependent DNS Lookup

A system and method which may directly resolve a URL into the IP address of a web server running a regional website of a web service provider based on a user's geographic location. A user may type a URL of a website in his browser. A user location analyzer may decide the user's geographic location according to his IP address. With the user's geographic location, a DNS server may resolve the URL to a regional website of a web service provider which provides services specific to the user's geographic location. Consequently, the user may be presented a regional website of a web service provider without delays caused by re-directing, and save the user's time and effort to look for a regional website himself.
Owner:R2 SOLUTIONS

Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties

A program or program snippet is rewritten to conform to site-specific properties prior to being executed by a target host. The program or program snippet directed to a target host from a known or unknown source is either intercepted by a server before reaching the target host or can be redirected from the target host to the server to effect its rewriting. The program is parsed in its external representation, converting it to an internal representation that is inspected and analyzed with reference to a site-specific properties database. A summary of the program's properties is then compared to the site-specific properties database by a binary rewriting engine, which produces a rewritten program in an internal representation. If appropriate, the program or program snippet is rewritten to convert it to a format suitable for execution on the target host. Furthermore, certifications may be added to the rewritten program to mark that the rewritten program obeys site-specific constraints. The rewriting service thus produces a program in an appropriate target representation that conforms to site-specific properties. These properties may relate to security, auditing, optimization, monitoring, threading, and / or management of the rewritten program.
Owner:UNIV OF WASHINGTON

Dynamic document context mark-up technique implemented over a computer network

A technique is disclosed for generating markup information to be displayed on a client computer system. The client system includes memory configured to store at least one update file which comprises keyword information relating to keywords suitable for markup. In one implementation, the update file is generated at a remote server system and downloaded to the client system. When a new document (e.g. a web page) is displayed on the client system to an end user, selected context associated from the document is analyzed for selected keywords. In a specific implementation, the selected keyword information is provided by an entity other than the end user. Using the selected keyword information, specific context in the document is selected to be marked up. According to a specific embodiment, the selection of the document context to be marked up may be performed at the client system. Markup operations are then implemented at the client system on at least a portion of the selected document context, thereby resulting in marked up document context which has a visual appearance that is different than the appearance of the initial parsed context. Additionally, a pop-up advertisement may be automatically displayed on the client system based upon the identified context in the document. When the user clicks on a portion of the marked up document context, the user may be redirected to a target URL which was not included as part of the initial parsed document context. Alternatively, a pop-up window or layer which includes a plurality of different links may be displayed to the user.
Owner:AMOBEE

Database system with query interception and redirection

A database system includes: a first database having back-end functionality for data storage and database query execution, a database front-end and an interception unit. The database front-end is configured for processing user queries directed to a back-end of a second database, and lacks the capabilities for directly accessing the first database. The interception unit is networked with the first database over a data network, and is configured for monitoring user queries under processing by the front-end to identify queries pertaining to data stored in the first database, and redirecting the identified queries to the first database for execution. Thereby the functionality of the database front-end is provided for data stored in the first database.
Owner:XEROUND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products