Listed below are several of the patents which have been given to eAcceleration Corp. and/or our employees. If you would like more information about patents in general, please visit the U.S. Patent and Trademark Office at http://www.uspto.gov/. From there, you can search for patents; and if you are an inventor, find out how to get a patent of your own.
- Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext (01/25/05)
- Computer-based player performance variation (12/14/04)
- Varying web page link based on user and web page status (9/10/02)
- Accelerating access to wide area network information (5/22/01)
- (Japanese Patent) Title: Cache Apparatus and Method for Storing Data in Non-Volatile Cache Memory Recieved from Plurality of Optical Data (02/10/98)
- Method and apparatus for digital storage and retrieval of data (04/21/92)
If you have any further questions or comments about our patents, please e-mail us at Patents@eAcceleration.com, and we will be happy to help you.
Receiver access to a secure communication is determined by the sender. The sender defines an access parameter, such as number of times a message can be decrypted, expiration time of message, or some contingent event that triggers expiration of a message. A send configuration module defines the encryption method, encryption key length, and the control parameter(s). A key management module serves to implement the send configuration parameters during a communication. Upon receiving a message the receiver module contacts the key management module to request a decryption key. The key management module returns the decryption key or a `denied` message. Once the message is decrypted at the receiver, the key and the decrypted source are deleted from the receiver computer. The message is displayed in a bit-mapped window.
Allowed actions of a computer-based player in a game are limited. A pre-action value is identified which corresponds to a relative advantage between the computer-based player and a real person player prior to a current action taken by the computer-based player. A post-action value is identified corresponding to the relative advantage between the computer-based player and the real person player after the current action taken by the computer-based player. The current action is limited to be among a set of allowed actions, which keep the post-action value at least as great as a threshold value. The current action of the computer-based player also may be limited to keep the post-action value not more than a tolerable value, where possible. The current action is selected from the set of allowed actions. The threshold value and tolerance value are prescribed, selected or varied over the course of the game.
A plurality of vendors include a prescribed hyperlink protocol in their web pages to be participating web pages. The protocol included is the same for everyone, although the function and appearance of a resulting hyperlink varies. For a non-participating end user, the prescribed hyperlink forwards access to a sign-up site. For a participating end user, the function varies according whether the current web page is the referral web site start page, a referral web site non-start page, the privileged web site start page, a privileged web site non-start page, or another participating web page. For the referral start page, the hyperlink redirects access to the privileged web site start page. For the privileged start page, the hyperlink redirects access to the referral start page. For other participating web pages, the function may rotate to redirect access to the referral site or the privileged domain.
Portions of the internet are embedded onto a transportable media, then delivered periodically to subscribing clients. The contents are indexed to relate a given document to a URL and a time stamp. During on-line access to the internet, the transportable media serves as a read only cache. After issuing a command to view a document at a given URL, a test is performed to see if the document stored on the media is up to date. A command is sent over the internet to identify the date for the most recent update of the document. If the identified date is more recent then the corresponding time stamp, the media version is out of date. So the document is downloaded and displayed. If, however, the time stamp is the same or more recent then the identified date, the document as stored on the media is displayed.
A method and apparatus for error detection and correction in the storage and retrieval of digital data on magnetic storage systems includes converting the digital data into analog waveforms, multiplexing the analog waveforms with reference values and storing same as a data stream, demultiplexing the reference values from the data stream and using the retrieved reference values to detect and reduce distortion or other errors in the data stream. Assignment of data to analog waveforms includes option of assigning arbitrary quantities of data to a compact analog waveform representation. Analog errors may be detected and corrected statistically, while digital errors may be detected and corrected using standard signal processing techniques.