Internet Patents for Sale or License
Notify me of New Entries on this Page
You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.
To verify the invention, mass polls were carried out, in which 2282 people participated. In the conducted algorithm verification surveys, a question was placed on the usefulness of the algorithm in specific amounts of potential purchase. The last question was the following: "Will you buy an applicat...
...
The patent covers apps that transform a mobile device into a Pointing and Identification Device (PID) that is used to directly point at an item in a show, on a computer, or in the world. The image is uploaded and the app returns a list of items related to the image. The user can then select a spec...
...
In a nutshell, what is this patent about ?
It gives a sender of a message, the power to disable the ringtone that usually plays, when the message reaches the receiver.
In addition, it gives another option – preventing the screen of the receiver from turning on, when the message reaches the rec...
...
The present invention relates to a method for reducing the latency time for interactive data communication between a client computer and a server computer connected via a satellite network containing a geostationary satellite, as well as a
satellite network for undertaking such a method....
...
A method of optimizing latency delays in VoIP and other multimedia communications using IPv6 over the “publics” internet and between two end users that involves selecting an optimum VoIP route based upon periodic trace measurements of the best available VoIP routes at the time of VoIP communications...
...
Device for transmission of satellite range signals allows either to decrease the overall dimensions of the receiving satellite antenna in 1,5-2 times without loss of receiving signal quality or to improve the base characteristics of receiving signal maximum likely what is very important for regions ...
...
This is a methode for implementation of identification code systems in a DNS (Domain Name System) providing domains + web pages, and services to clients. Practically this means that all kind of identification code (like telephone numbers isbn or social sec. nr) systems exclusively can be implemented...
...
Embodiments of content addressable memories for internet protocol devices and operations are described herein, Other examples and related methods are also disclosed herein....
...
A computer readable medium comprising computer readable code for data transfer. The computer readable code, when executed, performs a method. The method includes receiving, at a first Axon, an ARP request from a source host directed to a target host. The method also includes obtaining a first route ...
...
A method of comparing first and second documents, the method comprising determining criteria of the comparison, selecting comparison means based on the criteria from a plurality of comparison means, and performing the comparison of the first and second documents by using the selected comparison mean...
...
A device for providing a built-in broadband dial-up function belongs to the network communication field. The device comprises: a USB communication interface module, a processor, a first storage module and a network dial-up interface module. The USB communication interface module is connected with th...
...
A method, system, server and client for transmitting media stream data are provided. The method includes: dividing all clients in a conversation into a first conversation group and a second conversation group; retransmitting the received media stream data to the client in the first conversation grou...
...
An artificial neural network apparatus comprising an array of neural units, each comprising a router, at least one neuron device and at least one synapse unit. The routers of respective neural units communicate with one another using data packets. The synapse units receive and create analogue signal...
...
A method of performing a cryptographic process on data, the cryptographic process treating a quantity of the data as an element of a Galois field GF(?k), where k=rs, the method comprising: isomorphically mapping the element of the Galois field GF(?k) to an s-tuple of elements of a Galois field GF(?'...
...
The embodiments of the invention provide an address reporting method and apparatus, a connection establishing method and apparatus, and a communication system. The address reporting method includes: obtaining the network address and static information; registering the network address and static inf...
...
A wireless terminal and a wireless network interface card are disclosed. The wireless terminal includes a terminal shell (110) and a signal processing circuit board (120), where the terminal shell is made of an electrically conductive material with a cavity slot (111) cut on its surface; and the ter...
...
Provided is a Web system (A1) wherein an application for a command target system is not necessary at a client (B1), and a data transfer operation from a command target system (C1) is easy, under the conditions that the direct control from the Web system (A1) to the command target system (C1) is impo...
...
The method involves determining authentication parameters corresponding to identification characteristics during pairing without an option of intervention of terminal users, or automatically negotiating the parameters based on close-range communication, where a terminal (2) i.e. mobile phone, is cou...
...
A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a c...
...
A redundant device stores configuration information, including IP addresses and routing information used for transferring user data, and session information for each device in use. Then, in the event that a problem occurs with any of the devices in use, the redundant device continues the transfer of...
...
Successful e-commerce websites, including Amazon.com, eBay and Netflix, use recommender systems to increase overall sales, cross-sales and up-sales. Any time you see product suggestions on a website, you are seeing a recommender in action. Multiple recommenders can be combined to provide even bette...
...
WO/2009/013613
Invention relates to methods of representation of addresses of Internet resources placed on the Internet, in particular, to a web site with a database containing a link to an Internet resource and an alphabetic, numeric, alphanumeric code assigned to it, or a code that uses other cha...
...
Highlights
A system for sorting through thousands of book reviews to rank the most helpful Identifies helpful information in reviews and automatically ranks them Human evaluators’ choice of most helpful reviews corresponded with the MLLM’s choice 85% of the time Can be used for all types of produ...
...
Web design and scripting are time consuming processes made even more daunting as the size and complexity of an organization increases. Developers at the University have simplified the task of creating an up to date, uniform website that has the ability to be customized by different sub groups with n...
...
Current computing work environments require users to log on manually to different servers for secure access to different licensed applications and data. The technologies involved for this purpose are inefficient and cumbersome. This invention relates to a software framework that provides a virtual d...
...
The JHU/APL Passive Forensic Identification of Networked TCP/IP Communication Endpoints method “fingerprints” the timing characteristics of a networked computer to distinguish it from a group of similar computers by using passively observed timing differences in TCP packets. In a successful first ap...
...
End-to-end Quality of Service (QOS) across multiple Service Level Agreement (SLA) domains is highly dependent on the performance limitations of individual domains—meaning end-to-end QOS expectations may not consistently be fulfilled. Although domain SLA management can optimize performance for all se...
...
This APL technology facilitates performing group detection and social network recognition within email archives that are often ambiguous, incomplete, and context-dependent
The APL technology falls under the link mining category as a cross-fertilization of ideas from network analysis and traffic a...
...
Wireless networks pose a number of security challenges: inherently non-exclusive medium, dynamic topology, and processing/memory constraints of nodes. Existing intrusion detection systems rely chiefly on network-layer and high-layer protocol information as input systems. Also, they are not robust ag...
...
The need for reliable and efficient image processing has increased dramatically, particularly in the area of transmission of video, television signals, and other large-size data files. While wide-band Internet connections make it easier to transmit such information over a network, it is still a goal...
...
Directed web crawling takes a specific expression of a topic and directs a web spider to locate documents that are generally relevant to that interest. Spiders may also be directed by the content of documents they examine, by the underlying link topology, or by meta-information about a document or U...
...
A method and apparatus for model-free, real-time, system-wide signal timing for a complex road network is provided. It provides timings in response to instantaneous flow conditions while accounting for the inherent stochastic variations in traffic flow through the use of a simultaneous perturbation ...
...
The present invention discloses a second-level bus arbitration method and apparatus for use with a distributed computer network. The invention alleviates any simultaneous access possibility by requiring any computing element, which claims access to the bus to first send a pseudo-random sequence over...
...
Description A web server-based program that facilitates collaborative work by enabling users to read and critique fully-formatted word processing documents over the internet using a standard web browser. Through access control systems and a SQL database interface, users are given access to certain d...
...
Abstract:
DIAMS is a system of distributed intelligent agents designed for collaborative information management, sharing and exchange on the World Wide Web. The system is designed to help a WWW user find needed information from his/her personal collection of URL links, as well as from other remote ...
...
A text message is sent to a server, where it is converted into speech and sent to a telephone number via a telephone line. A user may use a form to submit the text message to the server via an IP connection for conversion to speech using text-to-speech (TTS) technology. The user receiving the ...
...
Abstract:
DIAMS has many powerful tools that help users share information across distributed information assets such as a corporate network or the World Wide Web. Its features include flexible hierarchical displays and indexed query searches. Two additional features are an automatic indexing of res...
...
The inventors have developed a system for time-sharing parallel machines that provides isolation and enables the execution rate of an application to be tightly controlled.
Most parallel machines, such as clusters, are space-shared in order to isolate batch parallel applications from each other a...
...
Speculative Remote Display is the only known solution that eliminates network round-trip time for remote display systems, making the system more responsive in a wide-area environment.
Remote display systems allow a distant user to control a computer or application with a graphical user interface...
...
INVENTION: IDnet Mesh increases security and authentication on Intranets and the Internet. It accounts for a user’s real identity without publicly revealing his identity. IDnet Mesh helps ensure that all participating users on a web site are who they claim to be to a trusted authority, including the...
...
This invention allows individuals without multimedia development skills to create an interactive timeline for teaching or presentation purposes. This timeline can be published on the World Wide Web or displayed from a non-networked computer. The timeline consists of several parallel axes on which th...
...
Current theory tells us the ultimate throughput, or ergodic capacity, of an idealized communications system. The ergodic capacity is achieved in idealized systems by using codewords that are infinitely long and thus averaged over an infinite number of instances of the fading channel. Practical syste...
...
This invention is the first asynchronous multiple input/multiple output media access control (MIMO MAC) protocol that counters starvation and provides fairness. The invention exploits antenna selection and uses standard network utility maximization to find the number of used antennas per link in a g...
...
Summary The Text Annotator is a web-based authoring program that allows faculty to add written notes, images (jpg, gif, bmp, png) audio files (aif, mp3, wav, avi) video clips (mgp, mpeg, wma) or links to other web sites to texts that students can access from a web browser. Texts in any language usin...
...
Introduction Researchers at the UW have developed a low-cost microwave phase shifter that will be a key component of the ground station antenna for the proposed high-speed satellite based internet connection. The designs use a low-power electro-active polymer (EAP) as an actuator. Technology descrip...
...
Signed up for selling some patents at your market place last week. Yesterday I recceived a contact from a serious and relevant company. Really impressed, thanks for a great service!
– Cristina C.