This page is updated frequently with new Computer Network-related patent applications.
|Database driven computer systems and computer-implemented methods for attributing in real-time web originated activities to media events and tracking the performance thereof|
In some embodiments, the present invention is directed to a computer system which includes: a specifically programmed server, where the server includes a plurality of modules configured to perform at least: electronically and periodically obtaining, over a computer network, media data from a plurality of computer systems of media data sources, where the media data is associated with a plurality of media airings of a plurality creatives; electronically and periodically obtaining web tracking transaction data from a computer system of a web tracking electronic source; where the web tracking transaction data including web tracking metrics for web originated activities; where web originated activities include web orders placed in response to the offer associated with the creative; for each web order record in the transactional web data: attributing, by the specifically programmed server, a particular web order to a particular media airing; and displaying a real time updatable web attribution report.. .
|Selective routing of encrypted requests via computer networks|
Processing computer network requests by receiving from a requesting computer an encoded value in a domain name resolution request, where the encoded value has a valid domain name syntax, decoding the encoded value into a uniform resource locator having a host portion and a non-host portion, determining that the host portion of the uniform resource locator in combination with the non-host portion of the uniform resource locator meets a predefined routing criterion associated with a computer network address that is associated with a proxy server, and sending the computer network address to the requesting computer in response to the domain name resolution request.. .
|Automatically setting a clock of a network-connected apparatus|
An apparatus is provided that includes a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least perform a number of operations. The apparatus is caused to receive time information over a packet-switched computer network, with the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe.
Electrolux Home Products, Inc.
|Methods for website version control using bucket cookies|
A system and method are presented for addressing or requesting different versions of a web resource. A first web server electronically connected to a computer network receives from a requestor a first web resource request.
Go Daddy Operating Company, Llc
|Securing connections to unsecure internet resources|
There is provided a method for automatically intercepting two or more data packets transported over a computer network, where the data packets originated from client terminal(s), and each data packet comprising transport layer security protocol message(s). The data packets are automatically analyzed to identify secure connection request(s) to an unsecure domain hosted on web server(s), where the secure connection request(s) was received from one or more of the client terminal(s).
|Machine to machine communication to transmit and receive machine information|
A data communication system for construction machines for uploading data from and downloading data to other construction machines that may have better and/or more frequent communication connectivity to an off-board computer that is connected to a computer network.. .
|Computer-generated accurate yield map data using expert filters and spatial outlier detection|
A method and system for decontaminating raw yield maps by combining filters with spatial outlier detectors is provided. In an embodiment, the method comprises receiving over a computer network electronic digital data comprising first yield data representing crop yields harvested from an agricultural field; applying one or more filters to the first yield data to identify, from the first yield data, first outlier data; generating first filtered data from the first yield data by removing the first outlier data from the first yield data; identifying, in the first filtered data, second outlier data representing outlier values based on one or more outlier characteristics; generating second outlier data from the first filtered data by removing the second outlier data from the first filtered data; generating and causing displaying on a mobile computing device a graphical representation of the crop yields harvested from the agricultural field using only the second outlier data..
The Climate Corporation
|System and ensuring the quality of a translation of content through real-time quality checks of reviewers|
Computer systems, methods, and media for guaranteeing the quality of a language translation of content by using a computer network of human and/or machine translators and human reviewers of the original translation. The accuracy and quality of the original translation by a translator is ensured by a translation service provider computer system breaking the original translation into parts, and incorporating fabricated errors into a percentage of the parts while keeping the remaining parts unaltered.
One Hour Translation, Ltd.
|Proactive failure handling in data processing systems|
Embodiments are directed to predicting the health of a computer node using health report data and to proactively handling failures in computer network nodes. In an embodiment, a computer system monitors various health indicators for multiple nodes in a computer network.
Microsoft Technology Licensing, Llc
|Fire service and equipment inspection test and maintenance system|
A system for documenting, monitoring, testing, inspecting and maintaining fire equipment located at the property of secondary customers. Secondary customers include people, organizations and properties.
Assessing effectiveness of cybersecurity technologies
A method for assessing effectiveness of one or more cybersecurity technologies in a computer network includes testing each of two or more component stages of an attack model at a first computer network element twice. A first one of the tests is conducted with a first one of the cybersecurity technologies operable to protect the first computer network element, and a second one of the tests is conducted with the first cybersecurity technology not operable to protect the first computer network element.
Siege Technologies Llc
Method of communicating between secured computer systems, a computer network infrastructure and a computer program product
A method communicates between secured computer systems in a computer network infrastructure. Data packets are transmitted between a plurality from a group of processing computer systems, wherein such a transmission is performed by at least one broker computer system.
Fujitsu Technology Solutions Intellectual Property Gmbh
System, method, software, and computer network management
Systems, methods, software, and apparatus for managing computer networks are described where a combination of high levels of technical expertise and access rights preclude current users from installing mandated ids and network management tools on the small office, home office (soho) and small branch installations. In some embodiments, the invention implements network packet capture and distributed packet and stream analysis using “hacker” techniques that redirect existing network packet flows to the network management and monitoring appliance without requiring the network user to have authorized access to reconfigure the router.
System of third party event selection for personal calendars
A combinatory device; said combinatory device having at least a processor, a memory, a gps module and a wireless communications module all in electronic communication with each other within the combinatory device; a software module executable on the combinatory device; the software module receiving data from at least a first data store; said data store having at least a first processor, a memory and a first data store communications module; the first datastore storing at least first indexed data; said first indexed data referenced against at least a first criterion and a second criterion; the software module receiving data from at least a second datastore; said second datastore having at least a processor, a memory and a second datastore communications module; the second datastore storing at least second indexed data; said second indexed data referenced against at least a first criterion and a second criterion. Also disclosed is a method of combining content retrieved from an internet connected computer network; the method comprising of storing fixed form content and variable form content in a first database; storing fixed form content and variable form content in at least a second database remote from the first database; indexing the variable form content by the use of keys; transmitting the variable form content and the fixed form content to a combinatory device; selecting content derived from the variable form content for presentation referenced against a time scale based on criteria..
System and providing computer network security
This disclosure relates generally to computer network, and more particularly to a system and method for providing computer network security. In one embodiment, a method is provided for providing computer network security.
Detection of advanced persistent threat attack on a private computer network
A system for detecting an advanced persistent threat (apt) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network. The critical asset may be a computer that stores confidential data of the organization.
Trend Micro Incorporated
User authenticated encrypted communication link
Systems and methods are provided for establishing a secure communication link between a first client and a second client. One exemplary computer-implemented method for establishing a secure communication link between a first client and a second client includes accessing, from a storage, identification information of a user of the first client.
Providing location-specific network access to remote services
Techniques are described for providing users with access to computer networks, such as to enable users to create and configure computer networks that are provided by a remote configurable network service for the users' use. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client.
Amazon Technologies, Inc.
Mobilized laundry service system
A distributed laundry system having mobilized laundry vehicles, including true laundry conveyors in the vehicles, and including a specialized distributed computer network in the vehicles to handle the circumstances of mobile laundry operations, such as special laundry instructions. In addition, procedures and operations which allow the vehicles to cooperate to provide efficient pickup and drop off services at locations of the customers' choices (such as at home or work), including flexible territories for the trucks, customer user interfaces on mobile devices such as cell phones, mobile computing devices and the like, and precise time estimates of pick-up and drop-off times..
System and utilizing restaurant services
A system and method designed to increase the operating efficiency of a restaurant by decreasing the customer waiting times during the dining experience. Application software is provided that is utilized by both the restaurant and patrons over a computer network.
Trading goods based on image processing for interest, emotion and affinity detection
A system for trading goods over a computer network based on image processing includes an image processor that analyzes a picture received from a user to build a description of entities in the picture and correlations among the entities, a description interpreter that analyzes the description to determine an underlying message in the picture and detect information regarding the user's interests, emotions and affinities to goods and services, wherein the information is stored with the user's profile, the user's list of items to trade, and the user's past transaction history, and a trade matching component that uses the user's profile and produces a ranked list of other users with items to trade, or intermediary trade steps, when another user initiates a new trading transaction.. .
International Business Machines Corporation
Layer-2 security for industrial automation by snooping discovery and configuration messages
In one embodiment, a switch in a computer network listens to a device naming exchange on trusted interfaces to learn device names of devices reachable on interfaces of the switch. The switch then listens to the device naming exchange to learn a corresponding interface of the switch on which each particular (named) device is reachable, and associates each learned device name to the learned corresponding interface for that particular device.
Cisco Technology, Inc.
Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments include generating a disaster scenario that includes elements of a disaster event, modeling the disaster scenario against a profile of the computer network and the entity, determining theoretical damage based on the modeling, and updating a cyber security policy or a network change to mitigate the theoretical damage..
Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in one or more computer networks for an entity. Various embodiments include establishing a plurality of proxy connections with entity resources, evaluating performance of the proxy connections, and scoring the proxy connections based on performance.
Dynamic web services server
A method is provided for a multi-tenant system to accept web service calls from third party systems over a computer network. The method includes centrally receiving messages with different endpoint urls from the third party systems over the computer network and processing each message by parsing an endpoint url of the message to identify a tenant and an action for a payload of the message and authenticating the message.
Heat Software Usa Inc.
Secure domain name resolution in computer networks
Various techniques for improving privacy and security of domain name systems are disclosed herein. In one embodiment, a method includes transmitting, from a client device, a dns query containing a domain name to a caching server for resolving the domain name.
Microsoft Technology Licensing, Llc
Faster ip address allocation in a hybrid cloud environment using subnet selective randomization
Multiple tenants within a hybrid cloud computing system may need ip addresses to communicate over a computer network external to the hybrid cloud system (such as the internet). Ip addresses are a scarce resource, and each address can only be assigned to a single tenant.
Method for controlling flood broadcasts in a wireless mesh network
Computer networks with multiple nodes are often required to deliver packets to all nodes in the network, commonly referred to as “flooding.” flooding is used to deliver multicast and broadcast packets generated by application, network and other layers of the networking stack. Flooding can be done very reliably but less efficiently via node to node “unicast” transmissions, or very efficiently but less reliably via “broadcast” transmissions.
Providing application metadata using export protocols in computer networks
In general, techniques for are described for providing application metadata using an internet protocol flow information export (ipfix) protocol in computer networks. In one example, a first network device including a processor and a memory may perform the techniques.
Juniper Networks, Inc.
Compact and integrated key controller monitoring networks
Compact and integrated local key controller apparatuses for remotely managing a network of wireless devices that are connected to a computer network switch. These apparatuses (including devices and systems) and methods of using them may provide secure and fully integrated, stand-alone wireless network controllers that may be accessed remotely without compromising the integrity of the network's firewall..
Method and system for predicting requirements of a user for resources over a computer network
The disclosed embodiments illustrate methods and systems for predicting requirements of a user for resources. The method includes transforming a message posted by the user into a first message vector.
Inferential analysis using feedback for extracting and combining cyber risk information
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks.
Computer-implemented cryptographic improving a computer network, and terminal, system and computer-readable medium for the same
A method at a terminal in a multiple-node digital communications network, comprising any one or more of: generating at least one symmetric first key(s), across all participating nodes in the multiple-node digital communications network and securely distributing the at least one first key(s) in encrypted form to multiple participating nodes of the multiple-node digital communications network, using at least one asymmetrically established second key(s), the participating nodes including at least one message-transmitting node(s) and at least one message-receiving node(s); generating at least one symmetric third key(s) for one or more communication session that includes one or more communications from the at least one message-transmitting node(s) to the message-receiving node(s); encrypting at least one payload message using the at least one third key(s) at the at least one message-transmitting node(s), sending the encrypted at least one payload message, and receiving the encrypted at least one payload message at the at least one message-receiving node(s); encrypting the at least one third key(s) using the at least one first key(s), sending the encrypted at least one third key(s), and receiving the encrypted at least one third key(s) at the at least one message-receiving node(s); decrypting the at least one third key(s) using the securely distributed at least one first key(s), at the at least one message-receiving node(s); and decrypting the at least one encrypted payload message using the decrypted at least one third key(s), at the at least one message-receiving node(s). A terminal, system, and computer readable medium are also disclosed..
Methods and systems for reducing burst usage of a networked computer system
Methods and systems for reducing burst usage of a networked computer system are described herein. In an embodiment, resource requesters can request, within a time window, resources over a computer network before the resources are available.
Live Nation Entertainment, Inc.
Auto discovery of configuration items
Implementations of a system, method and apparatus described herein execute a discovery process to identify a plurality of computing devices within a computer network and a respective configuration associated with each of the plurality of computing devices. Upon discovery of a first computing device configured by an agent, configuration management of the computer network is searched for a definition used by the agent to configure the first computing device, and the discovery process for the first computing device is modified based on the definition to identify a first plurality of configuration items associated with a current configuration of the first computing device.
Performance diagnostic for virtual machines
A method for a processor to provide a chart of a performance metric in a collection interval includes creating regions by dividing the collection interval into regions of increasingly smaller time intervals and determining a mean and a variance for each region based on data points in that region, sorting the regions by their variances and means, and processing the sorted regions. Processing the sorted regions includes removing any child region when its parent region has a variance that substantially represents the child region, and replacing any two neighboring or intersecting regions with a merged region comprising the two neighboring or intersecting regions when the merged region has a variance that substantially represents the two neighboring or intersecting regions.
Virtual communication device interfaces
Systems and methods for virtual communication device interfaces are disclosed. In some embodiments, a method may include receiving identification from a resident (e.g., an inmate or prisoner) of a controlled-environment facility (e.g., a jail or prison) and authenticating the resident based upon the identification.
Securus Technologies, Inc.
System and launching a process using a keyword identifier
A user apparatus for accessing an electronic resource via a distributed computer network. The user apparatus comprises a user interface for receiving a user input, a computer processor configured to execute computer instructions; and an application program comprising computer instructions executable by the computer processor.
System and setting functions according to location
An apparatus, system, and method for controlling functions of a vehicular alarm. The method includes receiving one or more signals including location information, determining a location of the vehicle using the location information, setting one or more functions based on the location information, determining whether an alarm function is activated, and activating the one or more functions according to the setting upon determining that an alarm has been activated.
Method and system for remote monitoring, care and maintenance of animals
A system for remote care of an animal includes a water-tight housing with a hardened structural shell defining a chamber for accommodating the animal, a door disposed in the housing providing entry into and exit from the chamber by the animal, a wireless data communication system disposed within the housing and wirelessly communicatively coupled with a global computer network, a mobility portion coupled to the housing and operable to move the housing, and a microprocessor disposed within the housing and in communication with the wireless data communication system and operable to control the mobility portion and the door.. .
Network-based pathology system with desktop slide scanner
A method for processing, saving and viewing a digital image of a microscope slide includes inserting a microscope slide into a digital slide scanner connected to an acquisition computer. A pre-scan formed from a plurality of image tiles uploaded to a network server while the pre-scan is being generated.
Mikroscan Technologies, Inc.
Method and collecting and disseminating information over a computer network
The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user and for the second user, at least one manipulations module and at least one display device for respectively displaying at least said linked digital information wherein said linked digital information associated with said first user is automatically updated on at least said display device of said second user when that information is manipulated, and wherein said linked digital information associated with said second user is automatically updated on at least said display device of said first user when that information is manipulated.. .
Backup communications scheme in computer networks
Various techniques for managing communications backup for computer networks are disclosed herein. In one embodiment, a method includes detecting an abnormal operating condition at a primary network node, the primary network node being coupled to a computing device via a first optical connection between an optical switch and the primary network node.
Microsoft Technology Licensing, Llc
Gaming aspects relating to multiplayer/tournament hybrid arcade/wager-based games
Various aspects described for implementing tournament hybrid arcade/wager-based gaming techniques via computer networks, including one or more casino gaming networks. The tournament hybrid arcade/wager-based game may include a non-wager based gaming portion and a wager-based gaming portion.
Synergy Blue, Llc
Hybrid arcade/wager-based gaming aspects relating to entertainment and wagering gaming activities
Various aspects described for implementing hybrid arcade/wager-based gaming techniques via computer networks, including one or more casino gaming networks. The hybrid arcade/wager-based game may include a non-wager based gaming portion and a wager-based gaming portion.
Synergy Blue, Llc
Method and system for groups of individuals to form and manage an investment club for trading in publicly traded securities, enabling individuals to monitor their hypothetical performance and embracing the features of an online social network
A system for forming and managing online investment clubs utilizes the features of an online social network to provide advantages in the operation of such online investment clubs. The system permits users to follow and assess the investment skill of other investors in their own or other investment clubs and to follow such individuals' future investment decisions and those of other investment clubs.
Systems, methods, and software for lien payoff and transfer of title
Systems, methods, and software for loan payoff and title transfer that significantly streamline and simplify the process of effecting ownership transactions. Some embodiments may include a computer network for providing communication between a plurality of title requestors and a plurality of financial institutions.
Symbolic print to electronic media bridge
A symbolic print-to-electronic media bridge system facilitates information flow across a computer network. Such a system can include a printed publication containing a print media instance with a printed symbolic key representation; a system agent with a media database having an electronic version of the print media instance stored therein; and a bridge agent having an output device and an optical input device to optically capture the printed symbolic key representation to provide a primary key.
Modular incubator system
An incubator (110, 140) for the reception of an individual sample carrier, a shelving system (100) for such incubators, a transport container for such incubators, as well as a modular system are suggested, wherein the incubators can be inserted and withdrawn (130) independently of one another, can be supplied with electricity, water and a gas via corresponding connections (150), and can communicate with a computer network via a wireless connection. Such a system reduces the risk of contamination or confusion in the lab and avoids interruptions in the monitoring and controlling of the environmental conditions in the respective incubators.
Ert Optik Dr. Thiel Gmbh
Method and computer network for transmitting messages
The invention relates to a method for transmitting messages in a computer network and to a corresponding computer network. A first group of components is provided, wherein the components of the first group send and/or forward and/or receive messages via one or more wired link(s) (110), wherein each component of the first group is either a computing node (101, 102, 103, 104, 105, x108), a star coupler (201, 203, 205, 207, 210, 211, x201), or a star coupler of a multi-hop network (1000), and wherein a second group of components is provided, wherein the components of the second group send and/or forward and/or receive messages via one or more wireless link(s) (110a, 110b, 110c, 110d), wherein each component of the second group is either a computing node (107, 108, x107, x109) or a star coupler (201, 210, 211, x201, x202), and wherein each component of the first and the second group has a local clock, and wherein the clocks of the components of the first and the second group are synchronised to one another or are synchronised with one another, and wherein the components of the first and the second group send and/or forward and/or receive messages in a coordinated manner in accordance with a common communications schedule..
Fts Computertechnik Gmbh
Automated detection of unauthorized uninstall operations
Network security and optimization requires user compliance with administrative actions controlled centrally from a server or administrator device to update and/or modify various user computing devices operating on the network. One example of operation may include identifying a diverting action performed via a computing device managed by an administrator device on a computer network, determining the diverting action is related to a software application currently operating on the computing device, transmitting a notification to the administrator device responsive to identifying the diverting action and responsive to determining the software application is currently operating on the computing device..
Online incremental scheduling deterministic networks
A method for transmitting messages in a computer network, e.g., a ttethernet network, the network including nodes and at least one star coupler, which are connected in a multi-hop fashion, the nodes periodically exchanging time-triggered (tt) messages according to a pre-defined transmission schedule, and wherein nodes exchange, according to the schedule, messages via scheduled time-triggered flows, wherein adding a new time-triggered flow into the running computer network includes: 1. Determining, for each hop in the new flow path of the new time-triggered flow, a free transmission gap in the transmission cycle of the corresponding port, 2.
Fts Computertechnik Gmbh
Computing system including dynamic performance profile adaptation functionality
A computer networking system including a client device and a server device having a server profiler module and an observer module is provided. The server profiler module maintains a server profile and profiles for at least one client device and the observer module is configured to receive client device performance information from the client device and server device performance information and determine and implement performance parameter alterations based on client device performance information and server device performance information received..
Blackline Systems, Inc.