Patent application number | Description | Published |
20090112821 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR MONITORING BOOKMARKED WEB PAGES - The present invention relates to a method for monitoring a bookmarked web page and a system and a computer program implementing such a method. A method according to an embodiment of the invention includes a first phase, including steps for storing, in association with each other, user identification data and an active version of the web page. The method further includes at least one iteration of a second phase, including a step for sending from user's browser to a network server a request for change information about the bookmarked web page since the stored version was active. On response of the server, if the web page has changed, the user has the possibility to choose to keep the stored old version of the web page or to accept the current version of the web page. The network server may be a server associated with the web page, e.g., a web site server, or an ISP server. | 04-30-2009 |
20090144269 | RESOLVING UNKNOWN MAILBOXES - The present invention relates to a method and system for processing electronic mails in case of a address change of the addressee. It provides an ECOA resolving process of searching for a new or alternative address for this addressee, optionally triggered in case of unknown address or non delivery notification message. This process comprises forwarding the email under ECOA resolving from one MTA to another MTA in the network, for trying to reach a MTA connected with a database where old and new addresses are memorized in association. Such resolving forwarding is done according to specific routing tables, possibly independent from DNS routing server, which may include specific or local analysis rules based on the invalid address. | 06-04-2009 |
20090216595 | SYSTEM, METHODS AND COMPUTER PRODUCTS TO MANAGE AN INDIVIDUAL MEETING WITH A TEAM - Systems, methods and computer program products for managing an individual meeting within a team. Exemplary embodiments include a method for managing individual meetings for all attendees of a team, the method including storing individual times slots for each attendee, determining a maximum number of time slots, for each available attendee saving a time slot count, for each time slot saving an eligible attendee count, allocating slots in which one attendee has a free time, setting remaining time slots as busy, decrementing an eligible attendee count and determining if the maximum number of time slots has been reached. | 08-27-2009 |
20090217176 | METHOD AND SYSTEM FOR MANAGING EVENTS IN AN ELECTRONIC CALENDAR APPLICATION - The present invention relates to a method for managing meeting conflicts using user defined priority within a electronic calendar application, and providing history of meeting invitations. When a new meeting is being scheduled, if a conflict exists, the user may set a priority to the meeting. On reschedule or suppress meeting, a priority of overlapped meetings are automatically updated and acceptance is generated for meeting becoming in higher priority. A GUI allows user to modify priority of meetings at any time (accept and “decline with keep me informed” are automatically generated according to new priority). | 08-27-2009 |
20100004816 | SYSTEM AND METHOD FOR GATHERING AND SUBMITTING DATA TO A THIRD PARTY IN RESPONSE TO A VEHICLE BEING INVOLVED IN AN ACCIDENT - A system and associated method for gathering and submitting data to a third party in response to a vehicle being involved in an accident. First an information manager stores data regardless of the vehicle being involved in an accident. Next the event detection manager stores data in response to detecting the vehicle being involved in an accident. Next the information manager stores state data pertaining to the vehicle's current state. Then an adjacent identifier manager requests, receives, and stores data from surrounding vehicles in memory. Next a report is generated and encrypted. Finally, the encryption and transmission manager stores the report in memory. | 01-07-2010 |
20100066513 | VEHICLE AUTHORIZATION METHOD AND SYSTEM - A vehicle authorization method and system. The method includes transmitting, by a computing system in a vehicle, a first request for enabling the vehicle for a driver. The computing system receives vehicle identification data associated with the vehicle. The computing system identifies the driver. The computing system transmits a second request for information associated with the driver. The computing system receives driver's license data associated with the driver, a list comprising authorized drivers for the vehicle, and insurance data associated with the driver and the vehicle. The computing system analyzes the vehicle identification data, the driver's license data, the list, and the insurance data. The computing system performs specified functions associated with the vehicle. The computing system generates and stores a report indicating the specified functions. | 03-18-2010 |
20100077039 | METHOD AND SYSTEM FOR PLAYING VIDEO ON A MOBILE DEVICE - The invention provides a system and a method for automatically switching from a local storage to a remote storage for recording a broadcast video stream, the switching being triggered by the fact that the local storage is almost full, and for automatically switching from a local storage to a remote storage for playing a broadcast video stream in a delayed manner, the switching being triggered by the fact that the video frames in the local storage are exhausted. | 03-25-2010 |
20100106417 | SYSTEM AND METHOD FOR IDENTIFYING A TRAJECTORY FOR EACH VEHICLE INVOLVED IN AN ACCIDENT - A method for identifying a trajectory for each vehicle involved in an accident. The method begins by plotting on a Cartesian Coordinate Plane GNSS locations corresponding to a vehicle involved in the accident. Next, the method identifies GNSS locations on the Cartesian Coordinate Plane where the vehicle was speeding. Next, the method marks those GNSS locations on the Cartesian Coordinate Plane where the vehicle involved in the accident was skidding. The process of plotting and identifying speeding as well as skidding is repeated for all vehicles involved in the accident. The Cartesian Coordinate plane then having all vehicle trajectories residing therein is sent to an output device. | 04-29-2010 |
20100109852 | EXPIRATION MANAGEMENT METHOD AND SYSTEM - An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results. | 05-06-2010 |
20100131410 | PURCHASING DATA MANAGEMENT METHOD AND SYSTEM - A data management method and system. The method includes retrieving by a computing system, first identification data associated with a buyer of a product. The computing system retrieves product data associated with the product. The product data is compared to campaign data associated with a campaign. The campaign is associated with an entity associated with the product. The computing system determines that the product is associated with the campaign. The computing system generates second identification data comprising the first identification data, an identification code for the product, a campaign code indicating that the product is associated with the campaign, and a date of purchase for the product. The computing system generates encrypted data comprising the second identification data in an encrypted format. The encrypted data is transmitted to a secure database system. | 05-27-2010 |
20100150353 | SECURE METHOD AND APPARATUS TO VERIFY PERSONAL IDENTITY OVER A NETWORK - The present application provides an apparatus and method for verifying a user, via captured biometric characteristics of the user, who is interacting online. The captured biometrics are guaranteed to be captured in real-time, and avoids the possibility of providing biometrics that were previously captured, by sending to the user a time-sensitive challenge and requiring the user to provide the requested biometric information within a predetermined time period. Therefore, the present invention is best positioned for environments where trusted identification of a user is needed online to facilitate secure transactions. | 06-17-2010 |
20100153722 | METHOD AND SYSTEM TO PROVE IDENTITY OF OWNER OF AN AVATAR IN VIRTUAL WORLD - The present application provides an method and system for verifying a user's identity within a virtual world environment. The verification is to be in real-time and avoids the possibility of providing credential (e.g., biometric information) that were previously authentication, by sending to the user a time-sensitive challenge and requiring the user to provide the requested credentials (e.g., biometric information) within a predetermined time period. Therefore, the present invention is best positioned for environments where trusted identification of a user is needed online to facilitate secure transactions. | 06-17-2010 |
20100161491 | VEHICLE FED ACCIDENT REPORT - A computer implemented method for rapidly and securely filing, via wireless means, a consolidated accident report. An additional aspect of the method encompasses a computer software product for performing the method described herein. In one embodiment of the invention, the opposing parties jointly fill out at least a part of a digital accident report form; i.e., each party fills out a different portion of the form. Each party has the opportunity to positively acknowledge or reject the information entered by their opposing party. The digital accident report form may be completed and filed with the rejection registered, although it is preferred that a mutually agreeable resolution be achieved. Once completed, each opposing party files the consolidated accident report with an appropriate interested third party, e.g., an insurance company, a law enforcement agency, or a hospital. | 06-24-2010 |
20100161752 | Method and System of Administrating a Peer-to-Peer File Sharing Network - A computer-implemented method, system, and computer program product for administering a peer-to-peer file sharing computer network. The method includes: maintaining a reference associating a particular shared file with a seeder in a community of peers and a number of seeders in the community; and registering a second peer as a second seeder of the particular shared file, if a first seeder in the community of peers has informed the peers of a termination of the availability of a file seeding of the particular shared file. The system includes means for performing the steps of the method. The computer program product includes computer program instructions for carrying out the steps of the method. | 06-24-2010 |
20100261463 | MOBILE ADDRESS BOOK POPULATION USING SMS POLLING - A system, method and program product that automatically populates address book fields. A system is described that includes: a system for sending and receiving SMS messages; an address book that includes an entry for an owner and entries for contacts associated with the owner, wherein each entry includes a set attributes and at least one piece of attribute data; a system for parsing an incoming SMS message to identify a request for attribute data of the owner and for generating a responsive SMS message with attribute data of the owner; and a system for issuing SMS messages to contacts in the address book requesting additional attribute data and for loading received attribute data into the address book. | 10-14-2010 |
20100332993 | METHOD AND SYSTEM FOR DELIVERING DIGITAL CONTENT - A method, computer program, and system for delivering digital content to a user interface. A method according to an embodiment includes: generating a starting content on the user interface including at least one clickable content, each of the at least one clickable content being previously associated with a first key; upon selection of a clickable content associated with a first key, determining a second key, associated with a destination content, from the first key; determining an executable asset program from the second key, an execution of the asset program generating the display of a predefined asset content; attaching the second key to the executable asset program according to a hiding mechanism; executing the executable asset program to display the predefined asset content, and releasing the second key during the execution of the program. | 12-30-2010 |
20110127342 | NANO TIMER CONTROL SYSTEM - The invention provides a pressure controlled device and a system for managing the heating time of a pressure controlled device. The system includes a sensing device that allows the timing of a heating period for the pressure controlled device based on temperature and/or pressure values sensed inside the pressure controlled device. A RFID tag is coupled to the sensing device and is operable for generating timing information. The sensing device and the RFID tag are powered by a nano electromechanical (NEM) device that is operable by a source of pressurized air. | 06-02-2011 |
20120070279 | CYCLIC BLADE SPEED CONTROL APPARATUS AND METHOD - A blade speed control apparatus and method. The apparatus includes a rotor assembly a first blade assembly movably attached to the rotor assembly at a first initial position, a second blade assembly movably attached to the rotor assembly at a second initial position, and a movement mechanism configured to move the rotor assembly in a first lateral direction along a y-axis such that a first angle exists between the first blade assembly with said respect to the second blade assembly. The movement mechanism is configured to move a portion of the rotor assembly in a first lateral direction along a y-axis such that a first angle exists between the first blade assembly with said respect to the second blade assembly. The first angle does not comprise an angle of 180 degrees. | 03-22-2012 |
20120151323 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MANAGEMENT OF WEB PAGE LINKS - A system, method and computer program product for the management of web pages links is disclosed. The method includes, by detecting a broken link event to reach a web page, retrieving within a database of referenced web pages, a referenced identifier of the web page. By using the retrieved referenced identifier, identifying within a database of referencing web pages, zero or more page identifiers identifying zero or more web pages imbedding the broken link. Then, by using each retrieved web page identifier, identifying within a database of web sites, one or more web site identifiers, and generating a broken link notification for each retrieved web site identifier. | 06-14-2012 |
20120233540 | METHOD AND SYSTEM OF GENERATING DIGITAL CONTENT ON A USER INTERFACE - There is revealed a progressive and conditional delivery of digital contents. A given master digital content is previously divided in content blocks, each content block being associated with related content blocks presenting particular hierarchical and dependency characteristics. Responsive to user selection of the master digital content, for each selected content block, there is checked first the display of each related content block and upon positive checking there is displayed the considered selected content block. There is further disclosed steps of checking display performed from an analogue capture of the user interface or from video frame buffer memory data. There may be detected predefined marks. There may be performed image similarity comparisons or image matching tests with expected images associated with content blocks. There are also disclosed predefined encryption keys being used to decipher one or a plurality of content blocks. In response to a negative display checking according to the invention, there is displayed a predefined content block such as a warning message, an authentication request, a kaptcha challenge, advertisement content or a blurred content block. There is discussed a correspondence of content blocks with DOM nodes. | 09-13-2012 |
20120282090 | HYDRAULIC CYCLIC BLADE SPEED CONTROL APPARATUS AND METHOD - A hydraulic blade speed control apparatus and method. The apparatus includes a rotor assembly comprising a shaft; a first blade assembly pivotably attached to the shaft at a first initial position; a second blade assembly pivotably attached to the shaft assembly at a second initial position opposite to the first initial position; and a hydraulic movement mechanism. An initial angle of 180 degrees exists between the first blade assembly with said respect to the second blade assembly. The rotor assembly is configured to rotate the first blade assembly and the second blade assembly in a first direction and a second direction opposite to the first direction. The hydraulic movement mechanism is configured to pivotably move the first blade assembly in different angular positions with respect to the rotor assembly and the second blade assembly. | 11-08-2012 |
20120324467 | COMPUTING JOB MANAGEMENT BASED ON PRIORITY AND QUOTA - In one embodiment, the invention provides a method of managing a computing job based on a job priority and a submitter quota, the method including determining whether a declared priority of a computing job exceeds a predetermined declared priority quota of a submitter; in the case that the declared priority of the computing job exceeds the predetermined declared priority of the submitter, substituting a reduced priority for the declared priority of the computing job; determining whether the reduced priority of the computing job exceeds a predetermined reduced priority quota for the submitter; and in the case that the reduced priority of the computing job does not exceed the predetermined reduced priority quota of the submitter, assigning the computing job to at least one computer resource at the reduced priority. | 12-20-2012 |
20140196047 | COMPUTING JOB MANAGEMENT BASED ON PRIORITY AND QUOTA - In one embodiment, the invention provides a method of managing a computing job based on a job priority and a submitter quota. | 07-10-2014 |