HOSHIKO, LLC Patent applications |
Patent application number | Title | Published |
20130177248 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 07-11-2013 |
20130142344 | AUTOMATIC LOCATION-SPECIFIC CONTENT SELECTION FOR PORTABLE INFORMATION RETRIEVAL DEVICES - A method for anticipating a user's desired information using a FDA device connected to a computer network is provided. This method further comprises maintaining a database of user tendencies within the computer network, receiving sensor data from the user's physical environment via the FDA device, generating query strings using both tendency data and sensor data, retrieving data from external data sources using these generated query strings, organizing the retrieved data into electronic folders, and delivering this organized data to the user via the FDA device, In particular, a data management module anticipates the type of information a user desires by combining real time data taken from a sensor unit within a FDA and data regarding the history of that particular user's tendencies stored within the data management module. | 06-06-2013 |
20130117396 | MESSAGE FILTERING METHODS AND SYSTEMS - Methods and systems can filter messages, such as electronic mail (email) messages. According to one example, a method reads sender information for an electronic mail message, wherein the sender information comprises a domain name and a first IP address. The method determines a second IP address associated with a web page associated with the domain name. The method compares the first IP address to the second IP address and provides an indication of likelihood that the electronic mail message constitutes spam based on the comparison of the first IP address to the second IP address. | 05-09-2013 |
20130081117 | PERSONAL CRITERIA VERIFICATION USING FRACTIONAL INFORMATION - A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user. | 03-28-2013 |
20130080515 | COMPUTER NETWORK STORAGE ENVIRONMENT WITH FILE TRACKING - A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files. In particular, files that may be corrupted by alternation include executable software files and compressed files, which may be fault intolerant. Fault tolerant files, which may include text and graphics files, may not be noticeably affected. In some cases, copyrighted files, media files, and/or other files are altered to prevent undesirable distribution. | 03-28-2013 |
20130041907 | METHOD AND APPARATUS FOR CONTENT FILTERING - A method for filtering content makes use of local filtering agents for end users, and a portal to a network of human reviewing resources. Local filtering agents request content classification for unclassified content. The portal routes requests from local agents to available human reviewing resources. A content classification is provided by the reviewing resources, and may be saved in association with a content identifier for future use. The method permits human review of content within a short period after review is requested. In an embodiment of the invention, a centrally-located switch is provided for controlling filtering levels at one or more user terminals. | 02-14-2013 |
20130036163 | METHOD AND APPARATUS FOR PROVIDING CONTENT TO USERS - Embodiments of the instant invention are directed to a method and apparatus for presenting unsolicited data to users without interrupting the user's activities, wherein the presentation of the unsolicited data is monitored and is available for review by the user at the user's convenience. Embodiments of the invention comprise a content and display manager, wherein the content and display manager include a display monitor, a content delivery system and a content controller. The display monitor selects the display of content to the users, in part, by reviewing a marker which defines the last time that content was displayed to the user and the type of content displayed. The content delivery system transmits a content window to a user computer via the controller. | 02-07-2013 |
20120331572 | METHOD AND APPARATUS FOR IDENTIFYING AND CHARACTERIZING ERRANT ELECTRONIC FILES - A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums. | 12-27-2012 |
20120233279 | MESSAGE FILTERING METHOD - A message filtering method makes use of a database in which domain names of a network, such as the Internet, are associated with IP addresses, or with geographic locations. Electronic messages are tested for authenticity by comparing domain names and IP addresses for a message being tested with information in the database. If the sender information in the message does not have the same associations as information in the database, the message may be blocked, flagged as spam, or subjected to further filtering. | 09-13-2012 |
20120215886 | MANAGEMENT OF BANDWIDTH ALLOCATION IN A NETWORK SERVER - A server is configured to transfer information to a plurality of client devices in accordance with bandwidth-limiting and bandwidth-adjustment techniques. Bandwidth may be reduced based on an amount of data previously transferred to a client device (e.g., within a prior time period). Bandwidth may also be reduced based on variable input parameters such as file size, data type, server load, network response time, and number of transfer requests from a client device within a prior period of time. In some embodiments, bandwidth may be reduced by inserting delays between portions of data being transmitted. A length of a delay period may be determined based on the various factors above (amount of previous data transfer(s), file size, etc.). Bandwidth to a client device may also be adjusted dynamically. In some embodiments, bandwidth may be increased (rather than decreased). | 08-23-2012 |
20120185251 | METHOD AND SYSTEM FOR CANDIDATE MATCHING - A method and system for candidate matching, such as used in match-making services, assesses narrative responses to measure candidate qualities. A candidate database includes self-assessment data and narrative data. Narrative data concerning a defined topic is analyzed to determine candidate qualities separate from topical information. Candidate qualities thus determined are included in candidate profiles and used to identify desirable candidates. | 07-19-2012 |
20120173605 | DISTRIBUTED COMPUTING BY CARRIER-HOSTED AGENT - A method for operating a host layer of a distributed computing system on a wide area network includes attaching an agent to a client-requested carrier. The method includes receiving a request for specified content from a client node via the wide area network, and sending the content and an embedded agent to the client. The agent has program instructions configured to execute on the client node to perform a processing function that operates on raw data to produce process data. The method further includes sending the raw data to the client node and receiving the process data from the client node as it is processed by the agent. The host layer may comprise a web server hosting a web site containing consumer-oriented web pages, and the carrier may comprise an HTML page containing user content. The agent may comprise a web page-enabled application embedded in the HTML page. | 07-05-2012 |
20120155720 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 06-21-2012 |
20120123669 | METHOD AND SYSTEM FOR AVIATION NAVIGATION - A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft. | 05-17-2012 |
20120116889 | METHOD AND APPARATUS FOR PROVIDING AUDIO ADVERTISEMENTS IN A COMPUTER NETWORK - A method and apparatus for providing audio advertisements in a computer network enables Web sites to deliver audio advertisements that cannot be bypassed by a visitor. More particularly, an advertising or sponsoring Web site receives a request from at least one user for delivery of a user-selected Web page associated with the Web site. The Web site selects at least one audio advertisement from a plurality of audio advertisements for delivery to the user in conjunction with the user-selected Web page. The Web site then delivers the audio advertisement to the user via the network in a format that precludes the user from controlling the manner of playback of the audio advertisement. | 05-10-2012 |
20120042276 | MONITORING APPLICATION FOR AUTOMATICALLY REQUESTING CONTENT - Embodiments of the instant invention are directed to a system, apparatus and method for monitoring a user's activities and displaying and presenting unsolicited content to users over a wide area network. Embodiments of the instant invention include a monitoring system comprising an activity monitor and a content transfer and display means, wherein the activity monitor comprises an event identifier and a timer. The monitoring system monitors user activities, identifies trigger events, measures the elapsed time of inactivity of the user and initiates the presentation of unsolicited data, or content, to the user computer. In general, the monitoring system identifies trigger events and measures the elapsed time between trigger events. If the elapsed time between the trigger events exceeds a predefined time period the monitoring system causes unsolicited data to be presented on the user computer. | 02-16-2012 |
20110313876 | METHOD AND APPARATUS FOR CONDUCTING DOMAIN NAME SERVICE - A method for conducting Internet domain name service to users connected to the Internet comprises an automated procedure for transferring Internet domain name service from a domain name owner to a domain name manager. This method further comprises Internet sub-domain name services to prospective buyers based on domain names transferred to the domain name manager. Messages requesting domain name service, including requests from domain name owners to sub-license their particular domain name to prospective sub-domain name buyers and from prospective sub-domain name buyers to license available sub-domain names, are received and responded to by an automated domain name management system. This automated domain name management system further comprises an interactive website which includes a database, search engine, and Web server. | 12-22-2011 |
20110282971 | PERSONAL CRITERIA VERIFICATION USING FRACTIONAL INFORMATION - A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user. | 11-17-2011 |
20110276477 | METHOD AND APPARATUS FOR MANAGING OWNERSHIP OF VIRTUAL PROPERTY - A method and apparatus for managing ownership of virtual property accessible to users is provided by a computer-implemented system connected to a network. This method and apparatus further comprises maintaining an inventory of virtual properties, managing ownership of virtual properties, and allowing use of virtual properties by corresponding property owners within corresponding network spaces. In particular, virtual properties are purchased from a system by user computers, wherein virtual properties may be accessed by a user and/or sold or traded to other users which may include auction websites | 11-10-2011 |
20110269519 | GAMING METHOD - A gaming method operates to provide expert card-counting information to some or all participants, in exchange for a premium. The premium may be a cash payment, a reduction in the prize amount or betting odds, some combinations of the foregoing, or any other useful remuneration. The house retains its edge via the premium. The method may be implemented for play at a physical or virtual card table. | 11-03-2011 |
20110256845 | VERIFYING GEOGRAPHICAL LOCATION OF WIDE AREA NETWORK USERS - A method for verifying a purported location of a wide area network user is disclosed. The method comprises the steps of receiving information from a user via a wide area network, including a purported geographical location of the network user. A first network address from which the information is received is recoded, and an access code is generated and recorded. The access code is broadcast in a defined region that includes the purported geographical location of the user. A user access code is then received via the wide area network from the user. The user access code is compared with the access code broadcast in a defined region, and the first network address is compared to a second network address from which the user access code is received. If the codes and addresses match, the geographical location of the user is considered verifies and the user may be validated. Various methods for broadcasting the access code and various systems for implementing the method are disclosed. | 10-20-2011 |
20110249912 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 10-13-2011 |
20110246625 | MANAGEMENT OF BANDWIDTH ALLOCATION IN A NETWORK SERVER - A server is connected to a plurality of connected client devices, and is configured to transfer information between any selected one of the client devices and a memory for static storage of information. The method comprises increasing the defined delay period after each execution of a packet transfer cycle, thereby discouraging the transfer of unacceptably large files. The delay period may be initiated, and the amount of increase or other adjustment to the delay period during the transfer cycle may be controlled, by selected a predetermined value from a table, or by calculating a value based on variable input parameters such as the file size, server load, network response time, and number of transfer requests from the client device within a defined prior period. | 10-06-2011 |
20110208654 | MANAGED PURCHASE ACCOUNT FOR DEFINED COMMODITIES - A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. A merchant computer may receive the identifier and process it to determine whether what is proposed for purchase using the account is a qualified type of good or service. The computer may obtain a list of qualified or unqualified products and compare the list to what is proposed for purchase. In the alternative, the computer may provide instructions to a human operator for the merchant, who may determine whether or not the proposed product is qualified. If the proposed product is deemed qualified for purchase, use of the account may be approved; if otherwise, use of the account may be refused. | 08-25-2011 |
20110118912 | METHOD AND SYSTEM FOR AVIATION NAVIGATION - A system operates to guide an aircraft to or along a route designed to maintain the aircraft within a safe glide distance of an acceptable emergency landing area. The system uses a database of emergency landing areas with glide characteristics of an aircraft to determine a route that minimizes travel time or other specified parameter, while keeping the aircraft within a safe glide distance of a landing area in the database meeting the landing requirements for the aircraft. | 05-19-2011 |
20110082754 | METHOD AND APPARATUS FOR PROVIDING INTERNET ADVERTISING SERVICE - A method and apparatus for providing advertising service in a computer network is provided. This method and apparatus further comprises receiving a request from a user via this computer network to view a Web page, providing conditions to the user for viewing this Web page, delivering this Web page to the user, determining if the user has met the conditions required for viewing this Web page, and terminating access of the user to this Web page if these conditions are not met. | 04-07-2011 |