Patent classifications
G06Q2220/12
Telephonic payment processing method for online services
According to an embodiment, access to an online resource is enabled by associating a telephony number with a network resource that is made available at a network location, where network resource is protected so as to be inaccessible without access being provided for users individually. A particular user may be detected in initiating a telephony session using the number. Access to the network resource may be activated or authorized for the particular user in response to detecting the user initiating the telephony session.
DISTRIBUTED DATABASE
A distributed database and a kit containing such distributed database and a data source, the distributed database containing a smart contract, wherein the distributed database is adapted to receive and store data from at least one associated data source collecting data regarding a component of a machine, wherein the distributed database is protected against manipulation. A method of monitoring a machine and the use of a distributed database to improve the utilization of a component of a machine is provided.
Network access authentication using a point-of-sale device
A user device can be configured for network access, such as for guest network access. In one example, a first device receives an indication of a transaction that uses the first device. The first device communicates a request for network access to an access point of the network in response to receiving the indication of the transaction. The first device then receives a first key from the access point. The first device provides the first key to the user device. The user device is to use the first key to obtain the network access to the network.
System and method for authorized digital content distribution
A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.
SYSTEM AND METHOD FOR FUZZY CONCEPT MAPPING, VOTING ONTOLOGY CROWD SOURCING, AND TECHNOLOGY PREDICTION
The invention provides a system and method for providing ttx-based categorization services and a categorized commonplace of shared information. Currency of the contents is improved by a process called conjuring/concretizing wherein users' thoughts are rapidly infused into the Map. As a new idea is sought, a goal is created for a search. After the goal idea is found, a ttx is concretized and categorized. The needs met by such a Map are prior art searching, competitive environmental scanning, competitive analysis study repository management and reuse, innovation gap analysis indication, novelty checking, technology value prediction, investment area indication and planning, and product technology comparison and feature planning.
AGGREGATION OF ENCRYPTED DATA
In some embodiments, an encryption system secures data using a homomorphic encryption. The encryption system encrypts a number by encrypting a number identifier of the number and combining the number and the encrypted number identifier using a mathematical operation to generate an encrypted number. The encrypted numbers may be stored at a server system along with their number identifiers. The server system can then generate an aggregation (e.g., sum) of the encrypted numbers and provide the aggregation, the encrypted numbers, and the number identifiers. The encryption system can then separate the aggregation of the numbers from the aggregation of the encrypted numbers using an inverse of the mathematical operation used in the encryption to effect removal of an aggregation of the encrypted number identifiers of the numbers from the aggregation of the encrypted numbers. The separated aggregation of the numbers is an aggregation of the plurality of the numbers.
Managing rights for installed software applications and items purchased therewith
In one example embodiment, a server includes a receiver configured to receive, from a first device, a request to resell an application installed on the first device and an item purchased using the application; a resale manager configured to: issue, to a second device, a resale price of the application and the item, and receive, from the second device, a request to purchase the application and the item; and a rights manager configured to issue, to a user account authenticated on the second device, rights to use the application and the item.
SYSTEM PROVIDING RELEVANT SERVICES TO TRANSIENT DEVICES IN WIRELESS NETWORKS AND METHODS THEREOF
Generally described, the present disclosure relates to communications and more particularly, to a system providing relevant services to transient devices in wireless networks and methods thereof. In one illustrative embodiment, a Unified Communications and Collaboration (UCC) client on a device can be synchronized with a network so that the device can appear as a local entity. The UCC client can facilitate exchange of data to ease the integration of the device into the local environment. After being synchronized, the UCC client can seek out available assistance from the local network and provide it to the user. Typically, the data retrieved from the local network pertains to the current location. The local network can be used to provide wireless service to mobile devices in order to remove them from their carrier network, including providing a local breakout via a Private Branch Exchange (PBX).
BLOCKCHAIN-BASED OUTLET SITE SELECTION METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM
A blockchain-based outlet site selection method, apparatus, device and storage medium can be provided. For example, using such exemplary method, apparatus, device and storage medium, in response to an outlet site selection request of a task demander, it is possible to determine a target data source and a target feature dimension associated with the target data source; acquire, from the target data source, target feature data of candidate grids in a target region according to the target feature dimension and target region information in the outlet site selection request; select a target grid from the candidate grids according to the target feature data of the candidate grids; and control the task demander to pay a token to the target data source based on a smart contract according to usage attribute information of the target feature data.
SYSTEM AND METHOD FOR MODELING, FUZZY CONCEPT MAPPING, CROWD SOURCED SUPERVISION, ENSEMBLING, AND TECHNOLOGY PREDICTION
The invention provides a system and method for providing ttx-based categorization services and a categorized commonplace of shared information. Currency of the contents is improved by a process called conjuring/concretizing wherein users' thoughts are rapidly infused into the Map. As a new idea is sought, a goal is created for a search. After the goal idea is found, a ttx is concretized and categorized. The Map provides for modeling where nodes are objects. The Map nodes also serve as binding points to other modeling paradigms such as spreadsheet cells. The needs met by such a Map are prior art searching, competitive environmental scanning, competitive analysis study repository management and reuse, innovation gap analysis indication, novelty checking, technology value prediction, investment area indication and planning, and product technology comparison and feature planning