51
Serafini Fabrizio: Distribution of e-learning courses and services. Scuola Di Management, Serafini Fabrizio, FIAMMENGHI Carlo, October 19, 2006: WO/2006/109342 (1 worldwide citation)

The technique of authentication through one time unique identifier for the access to e-learning services includes: i- the opening of an account by an organization that distributes the course and the relative subscription and the assignment of the permissions and the access rights to 5 the owner of t ...


52
Umesh Kumar Gl: Assessment for efficient learning and top performance in competitive exams - system, method, user interface- and a computer application. Umesh Kumar Gl, Savangikar Vasant Anantrao, May 26, 2011: WO/2011/061758 (1 worldwide citation)

The invention comprises a computer assisted answer recording method for e-learning, or e-assessment comprising: (a) recording an answer choice by the user of the said method for an objective type question by an answer selection submitting input action or by a marking action made on an said answer ch ...


53
Matthew A Porzio, James Andrew Fieweger: Computerized method and system for managing a community facility in a networked secure collaborative exchange environment. Synchronoss Technologies, Synchronoss Technologies, Frederick W Dour, October 31, 2017: US09807078

In embodiments of the present invention improved capabilities are described for managing a community facility in a networked secure collaborative computer data exchange environment, including providing an exchange community facility where each of a plurality of users operating a plurality of client ...


54
Christopher Todd Ford, Wade Callison, Fahim Siddiqui, Mushegh Hakhinian: Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys. Synchronoss Technologies, Synchronoss Technologies, Frederick W Dour, May 16, 2017: US09654450

In embodiments of the present invention, improved capabilities are described for securely sharing computer data content between business entities as managed through an intermediate business entity, where the secure sharing process utilizes encryption provided by the intermediate business entity but ...


55
William Huang, Liviu Rozin, James Andrew Fieweger: Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment. Intralinks, GTC Law Group PC & Affiliates, March 14, 2017: US09596227

In embodiments of the present invention improved capabilities are described for managing an email input facility in a networked secure collaborative computer data exchange environment, wherein a secure email input facility for accepting non-secure email from outside the exchange into the secure coll ...


56
Michael Scott Morton, Sibley Verbeck Simon, Noam Carl Unger, Robert Rubinoff, Anthony Ruiz Davis, Kyle Aveni Deforge: Method and system for indexing and searching timed media information based upon relevance intervals. Streamsage, Banner & Witcoff, January 10, 2017: US09542393

A method and system for indexing, searching, and retrieving information from timed media files based upon relevance intervals. The method and system for indexing, searching, and retrieving this information is based upon relevance intervals so that a portion of a timed media file is returned, which i ...


57
Edward Lopez, Joe Mihelich, Matthew F Hepburn: Load balancing among a cluster of firewall security devices. Fortinet, Hamilton DeSanctis & Cha, November 21, 2017: US09825912

A method for balancing load among firewall security devices (FSDs) is provided. According to one embodiment, a switching device performs adaptive load balancing among cluster units of an HA cluster of firewall security devices. A load balancing (LB) function implemented by the switching device is co ...


58
Martin L Cohen: Systems and methods for computerized interactive training. Breakthrough PerformanceTech, Knobbe Martens Olson & Bear, June 13, 2017: US09679495

Interactive electronic training systems and methods are described herein. Certain embodiments provide preprogrammed video, audio, and/or textual presentations of training materials which provide information related to skills/information to be trained. A scenario including real or animated actors is ...


59
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Mock attack cybersecurity training system and methods. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, November 21, 2017: US09824609

A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's ...


60
John DiGiantomasso, Martin L Cohen: Methods and systems for dynamically generating a training program. Breakthrough PerformanceTech, Knobbe Martens Olson & Bear, August 8, 2017: US09728096

Learning content management systems and processes are described that enable a user to independently define or select learning content, frameworks, styles, and/or protocols. The frameworks may be configured to specify a flow or an order of presentation to a learner with respect to a learning content ...



Click the thumbnails below to visualize the patent trend.