|| List of recent Computer Network-related patents
| System and method for collaborative structuring of portions of entities over computer network|
Techniques for arranging information in a computer based network system. The techniques running by processors, enabling the hierarchical arrangement of tree nodes by users, the ability to upload documents to the system, the ability to mark portion(s) of document(s) and associate each portion with at least one tree node, later saved on data storage devices..
| System for management of alternatively priced transactions|
A system and method thereof, comprising means for: communicating through at least one computer network interface with each of (i) a plurality of providers of accountable resources, and (ii) a plurality of registrars which register clients, each client having access to accountable resources of providers, and maintain client-associated accounts therewith; generating a token verifying that a client is authenticated by a registrar; logging accountable transactions identifying a client-associated account and a transaction valuation, maintained by the registrar; and periodically accounting for the logged accountable transactions between respective registrars and respective providers; wherein a valuation of the accountable transaction is dependent at least on information conveyed in the token.. .
| Method for regulated management of virtual visions|
The method for regulated management of virtual visions which their creators use to communicate in a multilayered communicative fragmentation positioned in a network environment will be applied mainly, but not only, to platforms for communication between network users such as social networks, astral media, etc. According to the method the users (1) via user devices (2) connect to the computer network (3) and get an opportunity to use the services of the provider (4), set up a user account (5) and access the services (6) of the provider (4).
| Content distribution system|
A system and method for distribution of content on a computer network between a plurality of content providers and a plurality of users. A plurality of content provider packets provided by one or more of the content providers are stored, and a link provided to users for access to the content provider packets.
| Vehicular part transaction system and method|
A vehicular part transaction system and method. A transaction coordinator can receive a part request from a purchaser via a computer network; send a respective bid invitation to sellers via the network; store associated sent-timestamps based on when bids are sent; receive a part offer from one of the sellers via the computer network; forward the offer to purchaser via the network; receive an acceptance from purchaser via the network; determine a transaction for part offer; charge the seller the transaction fee; and forward an acceptance notice, via the network, to the purchaser and seller.
| Computer network page advertising method|
The invention provides a system for promoting computer network pages. The system includes a mobile station that allows a user to conduct telephone calls and connect to a computer network.
| Anonymous location service for wireless networks|
An anonymous location wireless network service for use in a wireless network. The service provides content providers with the location of network users without revealing their identities.
|Automated system and method for provisioning and managing cloud desktop services|
An automated system and method including proprietary software applications and processes to be used by internet service providers, infrastructure as a service providers, independent software vendors, data center managers, and corporate enterprises to rapidly provision, configure and manage complex information technology environments that exist in virtual space (the cloud) and are provided for end user interaction using the public computer networks (internet) or private computer networks.. .
|Software appliance installation systems and methods|
Systems and methods of installing a software appliance via a computer network are shown and described. Such a method may include detaching, by at least one processing circuit, the software appliance from an operating system of a computing device.
|Reduced authentication times in constrained computer networks|
In one embodiment, a capable node in a low power and lossy network (lln) may monitor the authentication time for one or more nodes in the lln. The capable node may dynamically correlate the authentication time with the location of the one or more nodes in the lln in order to identify one or more authentication-delayed nodes.
|System and method for allocating datastores for virtual machines|
A datastore for a virtual machine that can be executed on a host computer networked to a physical storage system is allocated by a server. The server generates a unique identifier to associate with the datastore, wherein the unique identifier mimics a form of identifier that is generated by the physical storage system to identify volumes of physical storage in the physical storage system that are accessible to the host computer.
|Method, a system, a first server, a second server, a computer program and a computer program product for sending information about users assigned to work on tasks in a computer network|
The invention concerns a method for sending information about users assigned to work on tasts, wherein data sets comprising information about users and tasks the users are assigned to are stored in particular on a first server (101), wherein a request for information about a user is received, in particular via a receiver (api) of said first server (101), wherein said request comprises information about a predetermined task, wherein a test is performed, in particular by a processor (111) of said first server (101) to determine a data set comprising information about a user assigned to said predetermined task, wherein a reply is sent, in particular by a sender (api) of said first server (101), depending on the result of said test, wherein said reply comprises information about said user.. .
|Distributed globally accessible information network implemented for retrieving in real time live data from a community information network|
A distributed information network is constructed for gathering information from sites distributed across a globally accessible computer network, i.e., the internet. The distributed information network preferably includes a root server that stores a list of multiple distributed sites each represented by metadata.
|System and method for the presentation of advertisements|
A system and method for the presentation of advertisements is present. According to one embodiment, a number of impressions of an advertisement message are presented over a computer network such as the internet to a variety of viewer computers.
|Routing messages in a computer network using deterministic and probabilistic source routes|
In one embodiment, a data packet message is provided which includes a routing header configured to accommodate both a deterministic source route and a probabilistic source route for encoding a nodal source route. The nodal source route is selectively encoded with one or both of a deterministic source route and a probabilistic source route based upon one or more predetermined criteria..
|Traffic-based quality of service (qos) monitoring in highly constrained networks|
In one embodiment, one or more monitoring nodes may monitor network traffic within a computer network, and dynamically identify one or more paths within the network that specifically require performance monitoring based on one or more traffic criteria triggered by the monitoring. The one or more paths may each include one or more path nodes.
|User authenticated secure communication link|
Systems and methods are provided for establishing a secure communication link between a first client and a second client. One exemplary computer-implemented method for establishing a secure communication link between a first client and a second client includes accessing, from a storage, identification information of a user of the first client.
|Systems and methods for defining a simulated interactive web page|
The system includes a novel software application interactive representation modeling language, a software application (82) operative to use the modeling language to create, read and modify interactive representation models of the proposed applications, a memory (86) to store requirement data and interactive representation model data, a software application (92) operative to read and update the interactive representation model data across a computer network, a software application (76) operative to maintain a record of the requirements and to administer operation of the system, a software application (78) operative to render interactive representations of the proposed applications in browser readable format, a software application (82) operative to allow multiple instances of other applications to access interactive representation data and requirement data residing in the memory and a software application (84) operative to allow an individual user's interactions with the system to be broadcast across a networked system to other users.. .
|Computing system and method for controlling the execution of a decision process to maintain the data access efficiency upon receipt of an availability information inquiry|
Computer-implemented reservation method and system. The method utilized for controlling the execution of a decision process by a computer backend machine of a computer network upon receipt of a computation inquiry includes associating to the computer backend machine a configuration file containing at least a decision rule that drives the decision process and that is computed at least from a current value of a statistical indicator and a target value of the statistical indicator; periodically obtaining an updated value of the statistical indicator; upon detection that the updated value is differing from the target value, dynamically updating the configuration file which further comprises re-computing the decision rule using the updated value as new current value, and storing in real-time the re-computed decision rule in the configuration file..
|System and method for communicating product recall information, product warnings or other product-related information to users of products|
An automated system and method for communicating product information to consumers through a central computer using a distributed computer network. The central computer is connected to a plurality of public health and product recall information sources through a public network such as the internet.
|Content-aware computer networking devices with video analytics for reducing video storage and video communication bandwidth requirements of a video surveillance network camera system|
Disclosed are systems and methods for reducing video communication bandwidth requirements of a video surveillance network camera system that includes network communication paths between network video cameras producing video streams of scenes observed by the network video cameras and content-aware computer networking devices analyzing by video analytics video visual content of the video streams to provide managed video representing, at specified quality levels, samples of the scenes observed. Distribution of the managed video consumes substantially less network bandwidth than would be consumed by delivery through network communication paths a video stream at the specified quality level in the absence of analysis by the video analytics..
|Server, a system, a method, a computer program and a computer program product for accessing a server in a computer network|
The invention concerns a first server (101) for accessing a second server (102) via a computer network (100), adapted to upon successful authentication of first credentials of a first user (eu) registered on said first server (101) by said first server (101), provide said first user (eu) access to at least a subset of functions provided by an interface (api) of said second server (102) using second credentials of a second user (hu) registered on said second server (102) for authentication with said second server (102).. .
|Method and system of intelligently load balancing of wi-fi access point apparatus in a wlan|
A computer networking infrastructure for load balancing, which comprises a network, access points each with a first service set identifier, computing devices and a computing system. The computing system can receive requests from computing devices to access the network via a second service set identifier of an access point.
|Method of managing connectivity between resources in a computer network and system thereof|
There are provided a computer-implemented connectivity manager and a method of managing connectivity between resources in a computer network using the connectivity manager. The method comprises: generating a connectivity specification of a given application, said specification comprising one or more connections generated in accordance with received by the connectivity manager user's definition of network resources and connections therebetween required to the given application, each connection characterized by one or more source resources, one or more destination resources and services therebetween; recognizing, by the connectivity manager, all to access-control devices among the plurality of access-control devices, which are involved in controlling all connections comprised in said connectivity specification; identifying, by the connectivity manager, in each of the recognized access-control devices, access-control rules engaged in control of connections comprised in said connectivity specification; and mapping, by the connectivity manager, said connections comprised in said connectivity specification to the identified engaged access-control rules..
|System and method for the collaborative recording, uploading and sharing of multimedia content over a computer network|
A method and system for providing multimedia content to a user is described. The multimedia content may include a plurality of multimedia items.
|Automated personal information sharing system and methods|
Information is automatically identified and shared between individuals who wish to become socially or professionally “connected.” an electronic communication is sent from one person to another including a request or invitation to be personally connected. If the request is accepted by the other person, a computer network is automatically accessed without further user intervention to search of one or more electronic databases to locate information related to the persons.
|Method of billing a purchase made over a computer network|
A method of effecting a sale over a computer network in which it is determined whether a user passes fraud control before effecting a sale over a computer network. Information associated with a method of payment, such as credit card information, debit card information, checking account information, a telephone service account, a cable television account, a utility service account, or an internet service provider account, is requested from the user after the user passes the fraud control.
|Trading of financial interests including reallocation of committed order quantity|
Computer systems, methods, and computer program products are provided for facilitating trading of financial interests over computer networks. A computer system may send through the network a first order for a financial interest, where the first order is not presently executable in an execution venue but has associated with it a quantity that can be committed to a possible future trade.
|Collateralized cash clearing system and method|
Computer-implemented methods and systems are provided for fulfilling obligations between a plurality of parties over a computer network. In an exemplary implementation, a computer implemented method for fulfilling obligations between a plurality of parties over a computer network is provided.
|Method of routing multicast traffic|
A method of routing multicast traffic in a computer network is disclosed. The method comprises associating a plurality of multicast group addresses on a network device with respective multicast routing topologies.
|Geographic filter for regulating inbound and outbound network communications|
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security assertions are provided. Geographic information is collected, optimized, and shared between network objects to enforce network access control on the basis of configurable security assertions.
|Packet classification in a network security device|
Methods and apparatuses are described for inspecting data packets in a computer network. One or more data packets through the network have associated header data and content.
|Service association model|
Enabling associations between cloud services in a computer network cloud infrastructure system is described. Cloud services can include infrastructure as a service (iaas) storage and processing services, platform as a service (paas) database and java services, and software as a service (saas) customer resource management services.
|System and method for sharing media in a computer network|
A computerized method for sharing removable storage media in a network, the method comprising associating, in an index entry, a first piece of removable storage media in a first storage device with at least a first storage policy copy and a second storage policy copy; copying, to the first piece of removable storage media, data associated with the first storage policy copy; and copying, to the first piece of removable storage media, data associated with the second storage policy copy.. .
|Methods and systems for displaying schedule information|
A method and system comprising: receiving travel request data; retrieving schedule data associated with the travel request data from the database, the schedule data being further associated with a scheduled travel time; retrieving availability data associated with the travel request data from the cache, the availability data being further associated with an available travel time; and sending the schedule data and the availability data via a computer network.. .
|Methods and system for efficient lifecycle management of storage controller|
A computerized method for efficient retirement process of an old controller in a computer network storage system. The method provides for combining legacy non-pnfs data storage with a new temporary parallel nfs data storage.
|Rich service systems with customized content|
Systems and methods for providing experiential information to a client in a computer networked environment. Compiling experiential information relating to a plurality of “rentable” objects associated with a service provider, e.g., hotel rooms, restaurant tables, cruise ship vacations, event invitations, or the like is contemplated.
|Remote controller for multiple navigation devices|
Embodiments related to controlling one or more controllable marine electronics devices are provided. One example embodiment provides a remote control device comprising a touch-sensitive display.
|Using new edges for anomaly detection in computer networks|
Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed.
|Managing password strength|
A method for managing password strength including receiving a password on a data processing system for a user, filtering for personal information about the user from multiple independent data sources accessible across a computer network, computing the password strength by the data processing system using an algorithm which compares the password to the filtered personal information about the user, and presenting feedback to the user through a user interface on a data processing system display regarding the computed password strength.. .
|Managing password strength|
A method, system or computer usable program product for managing password strength including receiving a password on a data processing system for a user, filtering for personal information about the user from multiple independent data sources accessible across a computer network, computing the password strength by the data processing system using an algorithm which compares the password to the filtered personal information about the user, and presenting feedback to the user through a user interface on a data processing system display regarding the computed password strength.. .
|Two-factor authentication systems and methods|
Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an authenticating service to perform an action on behalf of a user.
|Allowing guest of hospitality establishment to utilize multiple guest devices to access network service|
Network traffic is received from a guest device on a computer network of a hospitality establishment, and a guest area of the hospitality establishment is accordingly identified. A login database is queried to find an unexpired login for the guest area, the unexpired login specifying a stored guest identifier corresponding to information retrieved from a property management system of the hospitality establishment regarding a guest of the guest area at a time when the unexpired login was created.
|Systems and methods for automated memory and thread execution anomaly detection in a computer network|
Systems and methods are provided for detecting an anomaly in a computer that is part of a population of networked computers. Snapshots are received from a plurality of computers within the population of computers, where individual snapshots include a state of assets and runtime processes of a respective computer.
|Computing disjoint paths for reactive routing mesh networks|
In one embodiment, a reactive routing computer network may be partitioned into diverse logical topologies, and a source node may transmit route request (rreq) messages toward a destination node on each logical topology. In response, the source node may receive route reply (rrep) messages indicating routes to the destination node in each logical topology.
|Trace route command execution from a virtualized environment|
A traceroute command may be used to diagnose a computer network or provide additional information regarding a computer network. A traceroute command may be provided to applications executing within a virtualized environment by allowing commands to be passed from the virtualized environment to a host operating system through a network interface.
|Cross-linking from composite images to the full-size version|
Methods and systems that provide for cross-linking from composite images that include receiving, over a computer network, a source image and then associating a first identifier tag with a first object in the source image. A composite image is generated from the source image, wherein the composite image includes a cropped image of the first object.
|Secure system for conducting product sales over a computer network|
Methods and apparatus are described which provide secure interactive communication of text and image information between a central server computer and one or more client computers located at remote sites for the purpose of storing and retrieving files describing and identifying unique products in connection with sales of the products. Textual information and image data relating to products received from one or more of the remote sites are stored separately at the location of the central server computer.
|Method and interface for network gaming|
A method and interface for advertising in a software application accessible over a computer network by a plurality of users is disclosed. A software application is executed on a display interface for interaction by a user and an advertisement is provided for display to the user on the display interface during the interaction of the user with the software application, wherein a content of the advertisement corresponds to the interaction of the user with the display interface..
|Detecting vlan registration protocol capability of a switch in a computer network|
In particular embodiments, a first switch implementing a first virtual local area network (vlan) registration protocol and connected to a first end of the trunk detects whether a second switch connected to a second end of the trunk implements the first vlan registration protocol. In an embodiment, the second switch may send an unsolicited message to the first switch indicating the vlan registration protocol implemented by the second switch.
|Access permissions entitlement review|
A system for operating an enterprise computer network including multiple network objects, said system comprising monitoring and collection functionality for obtaining continuously updated information regarding at least one of access permissions and actual usage of said network objects, and entitlement review by owner functionality operative to present to at least one owner of at least one network object a visually sensible indication of authorization status including a specific indication of users which were not yet authorized by said at least one owner of said at least one network object.. .
|Astral media and method of use|
The astral media is applied in the online communication or in a computer network structure between users and provides them with an opportunity to be anonymous using a random number of virtual visions. The users (1) whose number is unlimited may via user devices (2) use the internet or another network environment (3) to access the media (4).
|Remote service for executing resource allocation analyses for computer network facilities|
A system and method for performing remote resource allocation analyses on distributed computer systems utilizes a snapshot of a target distributed computer system obtained at a distributed computer system, which is transmitted to a remote resource allocation module so that a remote resource allocation analysis can be performed on the snapshot of the target distributed computer system. The snapshot includes configurations and resource usage information of at least some components of the target distributed computer system..
|Client placement in a computer network system using dynamic weight assignments on resource utilization metrics|
A system and method for placing a client in a computer network system uses continuously variable weights to resource utilization metrics for each candidate device, e.g., a host computer. The weighted resource utilization metrics are used to compute selection scores for various candidate devices to select a target candidate device for placement of the client..
|Intelligent network interface system and method for protocol processing|
A system for protocol processing in a computer network has an intelligent network interface card (inic) or communication processing device (cpd) associated with a host computer. The inic or cpd provides a fast-path that avoids host protocol processing for most large multipacket messages, greatly accelerating data communication.
|Computer network for quality testing clinical trial data|
A computer network system and a method for quality testing input clinical trial data are disclosed. The trial data is recorded by way of a form provided on a patient device or a physician device and is passed on in an encrypted, anonymized form to a central server.
|Multimedia recording system and method|
A multimedia recording system is provided. The multimedia recording system includes a storage module, a recognition module, and a tagging module.
|Systems and methods for online identity verification|
A system controlling online access to a study course verifies the identity of an individual taking a study course over a global computer network from a first computer at a node of the network. The first computer has a biometric identification program and communicates over the network with a second computer that is at a network node other than a node of the first computer.
|Method and system for providing to a second party, computer-network related information about a first party|
A method and system for providing computer-network related information about a second party. First, the second party receives a telephone number of a first party.
|Site-to-site 6rd tunneling using collocated border router and customer edge|
In one embodiment, a router gateway in a first local area network (lan) hosts both an internet protocol version 6 (ipv6) rapid deployment (6rd) customer edge (ce) as well as a 6rd border router (br). In one specific example embodiment, upon registering the br to a global computer network, the router gateway may then accept a 6rd tunnel from a device hosting a second 6rd ce of a second lan, such that the 6rd tunnel joins the first and second lans into a single lan.
|Speculative pre-authorization of encrypted data streams|
Techniques are disclosed for improving user experience of multimedia streaming over computer networks. For example, a method for presenting multimedia content may generally include receiving a request to stream a media title.
|Node address allocation|
There is provided a method for allocating node addresses in a computer network architecture and a computer network architecture for performing such a method. The computer network architecture comprises at least one master node and at least one slave node serially connected downstream of the master node.
|Mobilized laundry service system|
A distributed laundry system having mobilized laundry vehicles, including true laundry conveyors in the vehicles, and including a specialized distributed computer network in the vehicles to handle the circumstances of mobile laundry operations, such as special laundry instructions. In addition, procedures and operations which allow the vehicles to cooperate to provide efficient pickup and drop off services at locations of the customers' choices (such as at home or work), including flexible territories for the trucks, customer user interfaces on mobile devices such as cell phones, mobile computing devices and the like, and precise time estimates of pick-up and drop-off times..
|Online reward point exchange method and system with automatic reward redemption solutions|
An online reward exchange system and method of operation, which includes an exchange computer that interoperates via a computer network with user computers, reward point issuer computers, and merchant computers. The merchants' products may be purchased by a user by requesting an issuer(s) to redeem reward points in exchange for payment to the merchant for the product.
|Method for generating addresses in a computer network|
In a method for creating a plurality of addresses (h) for a network element of a communication network, the following steps are provided: a) creating (1) a virtual identifier (c) for each address to be created from an existing identifier (a) of said network element and from at least one configured piece of additional information (b); b) creating (2) an address from at least one created virtual identifier; c) checking (3) the virtual identifiers created in such a way or the addresses created from said virtual identifiers for the presence of a collision; d) discarding (4) colliding virtual identifiers or the addresses created from said virtual identifiers.. .
|Providing access to configurable private computer networks|
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client.
|System and method for sending money via e-mail over the internet|
A method and system for transferring money from a sender to a receiver utilizing a computer network such as the internet. The sender visits a web site and identifies, to the server over the internet, the receiver, an e-mail address of the receiver, an amount of money to be transferred, and a withdraw account from which money is to be transferred.
|Virtual training system|
A system for training a participant in professional practice. The system including a video playback device; one or more video recording devices for recording first video footage of a master practitioner interacting with one or more clients, and second video footage of an interviewer interacting with the master practitioner while watching the first video footage on the video playback device; a video editing device for preparing a video segment, the video segment including at least a portion of the first video footage and at least a portion of the second video footage; and a computer network for transmitting data to a training participant, the data including the video segment..
|Intelligent cropping of images based on multiple interacting variables|
Methods and systems for intelligently cropping images, including receiving, over a computer network, a source image, and then associating a first identifier tag with a first object in the source image. A cropped image is generated from the source image wherein the cropping is based on the first object.
|Digital delivery system and user interface for enabling the digital delivery of media content|
A system, method, and computer readable storage medium provide multi-platform accessibility of media content in a global computer network. Media content is selected in a client computer.
|Installing one or more programs, and at least a portion of their environment|
A system and method installs a computer program, as well as the environment in which the computer program operates, if such environment is not already installed. The program as well as its environment are obtained via one or more servers and a computer network..
|Entity management dashboard|
An entity management dashboard is implemented according to systems and methods disclosed herein. An example method may include displaying a first entity of a computer network in an entity management dashboard.
|Disaster recovery framework|
A system and method of orchestrating failover operations of servers providing services to an internal computer network includes a dr server configured to execute a control script that performs a failover operation. Information needed to perform the failover operation is stored on the dr server thereby eliminating the need to store agents on each of the application's primary and backup servers.
|Automatic connection of computing devices|
In one embodiment, a method of connecting to a client computing device is provided. The method is performed at a computing device, and in this method a connection is made to the client computing device.
A downtime calculator for a computer network system has a downtime request module, a user activity computation engine, and a downtime computation engine. The downtime request module receives attributes of a downtime request for the computer network system.
|Systems and methods for extraction of vehicle operational data and sharing data with authorized computer networks|
Systems, methods, and related computer programs are provided wherein vehicle operation data is extracted from an internal automotive network. A system for enabling the generation and sharing of vehicle operation data via a computer network includes a data harvesting device connected to an information system of a vehicle, the data harvesting device capturing vehicle information from the vehicle and processing the vehicle information to generate current vehicle operation data; and a computer system in communication with the data harvesting device, the computer system including one or more server computers connected to a computer network.
|Methods for online collaborative composition|
Systems and methods for creating and editing collaborative music compositions via a computer network, including remote uploading tracks by musicians, and for creating and joining a band, wherein the system and methods provide for at least one musician to join a virtual group of at least one other musician for the purpose of virtual collaborative creating and/or editing music tracks remotely, via an online network and interactive website therefor.. .