Internet Patents for Sale or License

Notify me of New Entries on this Page

You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.

Determining an optimality coefficient of an image

To verify the invention, mass polls were carried out, in which 2282 people participated. In the conducted algorithm verification surveys, a question was placed on the usefulness of the algorithm in specific amounts of potential purchase. The last question was the following: "Will you buy an applicat...
...

Pointing and Identification Device

The patent covers apps that transform a mobile device into a Pointing and Identification Device (PID) that is used to directly point at an item in a show, on a computer, or in the world. The image is uploaded and the app returns a list of items related to the image. The user can then select a spec...
...

Method for disabling the audible and visual notifications that are played and displayed upon receiving an incoming message

In a nutshell, what is this patent about ? It gives a sender of a message, the power to disable the ringtone that usually plays, when the message reaches the receiver. In addition, it gives another option – preventing the screen of the receiver from turning on, when the message reaches the rec...
...

Method for Reducing the Latency Time for Interactive Data Communication via a Satellite Network

The present invention relates to a method for reducing the latency time for interactive data communication between a client computer and a server computer connected via a satellite network containing a geostationary satellite, as well as a satellite network for undertaking such a method....
...

Voice Over Internet Communications Algorithm and Related Method for Optimizing and Reducing Latency Delays

A method of optimizing latency delays in VoIP and other multimedia communications using IPv6 over the “publics” internet and between two end users that involves selecting an optimum VoIP route based upon periodic trace measurements of the best available VoIP routes at the time of VoIP communications...
...

Device for transmission of satellite range signals

Device for transmission of satellite range signals allows either to decrease the overall dimensions of the receiving satellite antenna in 1,5-2 times without loss of receiving signal quality or to improve the base characteristics of receiving signal maximum likely what is very important for regions ...
...

Method of identifying and registering entities and an assembly of hardware and software for applying such a method

This is a methode for implementation of identification code systems in a DNS (Domain Name System) providing domains + web pages, and services to clients. Practically this means that all kind of identification code (like telephone numbers isbn or social sec. nr) systems exclusively can be implemented...
...

Longest Prefix Match Internet Protocol Content Addressable Memories and Related Methods

Embodiments of content addressable memories for internet protocol devices and operations are described herein, Other examples and related methods are also disclosed herein....
...

Method and System for Scalable Ethernet

A computer readable medium comprising computer readable code for data transfer. The computer readable code, when executed, performs a method. The method includes receiving, at a first Axon, an ARP request from a source host directed to a target host. The method also includes obtaining a first route ...
...

Document Comparison

A method of comparing first and second documents, the method comprising determining criteria of the comparison, selecting comparison means based on the criteria from a plurality of comparison means, and performing the comparison of the first and second documents by using the selected comparison mean...
...

Device for Providing Built-in Broadband Dial-up Function

A device for providing a built-in broadband dial-up function belongs to the network communication field. The device comprises: a USB communication interface module, a processor, a first storage module and a network dial-up interface module. The USB communication interface module is connected with th...
...

Method, System, Server and Client for Transmitting Media Stream Data

A method, system, server and client for transmitting media stream data are provided. The method includes: dividing all clients in a conversation into a first conversation group and a second conversation group; retransmitting the received media stream data to the client in the first conversation grou...
...

Artificial neural network architecture

An artificial neural network apparatus comprising an array of neural units, each comprising a router, at least one neuron device and at least one synapse unit. The routers of respective neural units communicate with one another using data packets. The synapse units receive and create analogue signal...
...

AES Algorithm Processing Method and Processors Resistant to Differential Power Analysis Attack

A method of performing a cryptographic process on data, the cryptographic process treating a quantity of the data as an element of a Galois field GF(?k), where k=rs, the method comprising: isomorphically mapping the element of the Galois field GF(?k) to an s-tuple of elements of a Galois field GF(?'...
...

Address Reporting Method and Apparatus, Connection Establishing Method and Apparatus, and Communication System

The embodiments of the invention provide an address reporting method and apparatus, a connection establishing method and apparatus, and a communication system. The address reporting method includes: obtaining the network address and static information; registering the network address and static inf...
...

Wireless terminal and wireless network interface card

A wireless terminal and a wireless network interface card are disclosed. The wireless terminal includes a terminal shell (110) and a signal processing circuit board (120), where the terminal shell is made of an electrically conductive material with a cavity slot (111) cut on its surface; and the ter...
...

Web System, Command Target System, and Content Data Providing Method

Provided is a Web system (A1) wherein an application for a command target system is not necessary at a client (B1), and a data transfer operation from a command target system (C1) is easy, under the conditions that the direct control from the Web system (A1) to the command target system (C1) is impo...
...

Media data e.g. image data, secure transmission method for use over e.g. internet, involves transmitting valid key by media center to authorized terminal before coding of media data, if authorized ter

The method involves determining authentication parameters corresponding to identification characteristics during pairing without an option of intervention of terminal users, or automatically negotiating the parameters based on close-range communication, where a terminal (2) i.e. mobile phone, is cou...
...

Method and System for Distributed, Localized Authentication in the Framework of 802.11

A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a c...
...

Communication System and Redundant Configuration Management Method

A redundant device stores configuration information, including IP addresses and routing information used for transferring user data, and session information for each device in use. Then, in the event that a problem occurs with any of the devices in use, the redundant device continues the transfer of...
...

DESIRE Recommender System

Successful e-commerce websites, including Amazon.com, eBay and Netflix, use recommender systems to increase overall sales, cross-sales and up-sales. Any time you see product suggestions on a website, you are seeing a recommender in action. Multiple recommenders can be combined to provide even bette...
...

Method of Simplification of Access to Internet Resources Placed on Internet, Links on which Are Published in Print and Electronic Media

WO/2009/013613 Invention relates to methods of representation of addresses of Internet resources placed on the Internet, in particular, to a web site with a database containing a link to an Internet resource and an alphabetic, numeric, alphanumeric code assigned to it, or a code that uses other cha...
...

Automatic Ranking of Product Reviews According to Helpfulness

Highlights A system for sorting through thousands of book reviews to rank the most helpful Identifies helpful information in reviews and automatically ranks them Human evaluators’ choice of most helpful reviews corresponded with the MLLM’s choice 85% of the time Can be used for all types of produ...
...

Central Website Management System

Web design and scripting are time consuming processes made even more daunting as the size and complexity of an organization increases. Developers at the University have simplified the task of creating an up to date, uniform website that has the ability to be customized by different sub groups with n...
...

Online On-Demand Extendable Software Framework for Network Distributed Applications and Data

Current computing work environments require users to log on manually to different servers for secure access to different licensed applications and data. The technologies involved for this purpose are inefficient and cumbersome. This invention relates to a software framework that provides a virtual d...
...

Method of Passive Forensic Identification of Networked TCP/IP Communication Endpoints

The JHU/APL Passive Forensic Identification of Networked TCP/IP Communication Endpoints method “fingerprints” the timing characteristics of a networked computer to distinguish it from a group of similar computers by using passively observed timing differences in TCP packets. In a successful first ap...
...

A Method for Providing Adaptive Quality of Service Across Heterogeneous Networks

End-to-end Quality of Service (QOS) across multiple Service Level Agreement (SLA) domains is highly dependent on the performance limitations of individual domains—meaning end-to-end QOS expectations may not consistently be fulfilled. Although domain SLA management can optimize performance for all se...
...

Social and Contextual Navigation and Analysis of Email Archives

This APL technology facilitates performing group detection and social network recognition within email archives that are often ambiguous, incomplete, and context-dependent The APL technology falls under the link mining category as a cross-fertilization of ideas from network analysis and traffic a...
...

Wireless Network Physical Layer Intrusion Detection System

Wireless networks pose a number of security challenges: inherently non-exclusive medium, dynamic topology, and processing/memory constraints of nodes. Existing intrusion detection systems rely chiefly on network-layer and high-layer protocol information as input systems. Also, they are not robust ag...
...

Continuous Transform Method for Wavelets

The need for reliable and efficient image processing has increased dramatically, particularly in the area of transmission of video, television signals, and other large-size data files. While wide-band Internet connections make it easier to transmit such information over a network, it is still a goal...
...

Directed Web Crawling Using Machine Learning

Directed web crawling takes a specific expression of a topic and directs a web spider to locate documents that are generally relevant to that interest. Spiders may also be directed by the content of documents they examine, by the underlying link topology, or by meta-information about a document or U...
...

Method for Model-Free Control of General Discrete-Time Systems

A method and apparatus for model-free, real-time, system-wide signal timing for a complex road network is provided. It provides timings in response to instantaneous flow conditions while accounting for the inherent stochastic variations in traffic flow through the use of a simultaneous perturbation ...
...

Method and Apparatus for Bus Arbitration Using a Pseudo-Random Sequence

The present invention discloses a second-level bus arbitration method and apparatus for use with a distributed computer network. The invention alleviates any simultaneous access possibility by requiring any computing element, which claims access to the bus to first send a pseudo-random sequence over...
...

Writers Interact on the WebTM

Description A web server-based program that facilitates collaborative work by enabling users to read and critique fully-formatted word processing documents over the internet using a standard web browser. Through access control systems and a SQL database interface, users are given access to certain d...
...

Distributed Intelligent Agents for Information Management and Sharing (DIAMS) (ARC-14654)

Abstract: DIAMS is a system of distributed intelligent agents designed for collaborative information management, sharing and exchange on the World Wide Web. The system is designed to help a WWW user find needed information from his/her personal collection of URL links, as well as from other remote ...
...

System for sending text messages converted into speech through an internet connection to a telephone and method for running it

A text message is sent to a server, where it is converted into speech and sent to a telephone number via a telephone line. A user may use a form to submit the text message to the server via an IP connection for conversion to speech using text-to-speech (TTS) technology. The user receiving the ...
...

Distributed Intelligent Agents for Information Management and Sharing (DIAMS) (ARC-14654)

Abstract: DIAMS has many powerful tools that help users share information across distributed information assets such as a corporate network or the World Wide Web. Its features include flexible hierarchical displays and indexed query searches. Two additional features are an automatic indexing of res...
...

Time-Sharing Parallel Applications with Performance Isolation and Control (26116)

The inventors have developed a system for time-sharing parallel machines that provides isolation and enables the execution rate of an application to be tightly controlled. Most parallel machines, such as clusters, are space-shared in order to isolate batch parallel applications from each other a...
...

Speculative Remote Display (26119)

Speculative Remote Display is the only known solution that eliminates network round-trip time for remote display systems, making the system more responsive in a wide-area environment. Remote display systems allow a distant user to control a computer or application with a graphical user interface...
...

IDnet Mesh: for a More Secure Intranet and Internet (28118)

INVENTION: IDnet Mesh increases security and authentication on Intranets and the Internet. It accounts for a user’s real identity without publicly revealing his identity. IDnet Mesh helps ensure that all participating users on a web site are who they claim to be to a trusted authority, including the...
...

Web-based Timeline Presentation Builder (System and method for displaying multimedia and text components in an interactive, web-accessible timeline interface) (Copyright Only)

This invention allows individuals without multimedia development skills to create an interactive timeline for teaching or presentation purposes. This timeline can be published on the World Wide Web or displayed from a non-networked computer. The timeline consists of several parallel axes on which th...
...

Throughput Maximization in Wireless Communications Systems

Current theory tells us the ultimate throughput, or ergodic capacity, of an idealized communications system. The ergodic capacity is achieved in idealized systems by using codewords that are infinitely long and thus averaged over an infinite number of instances of the fading channel. Practical syste...
...

Fair Asynchronous Random Access with Probabilistic Antenna Allocation in MIMO Multihop Networks

This invention is the first asynchronous multiple input/multiple output media access control (MIMO MAC) protocol that counters starvation and provides fairness. The invention exploits antenna selection and uses standard network utility maximization to find the number of used antennas per link in a g...
...

Text Annotator

Summary The Text Annotator is a web-based authoring program that allows faculty to add written notes, images (jpg, gif, bmp, png) audio files (aif, mp3, wav, avi) video clips (mgp, mpeg, wma) or links to other web sites to texts that students can access from a web browser. Texts in any language usin...
...

Mechanically Controllable Microwave Phase Shifters

Introduction Researchers at the UW have developed a low-cost microwave phase shifter that will be a key component of the ground station antenna for the proposed high-speed satellite based internet connection. The designs use a low-power electro-active polymer (EAP) as an actuator. Technology descrip...
...





Signed up for selling some patents at your market place last week. Yesterday I recceived a contact from a serious and relevant company. Really impressed, thanks for a great service!
– Cristina C.