Patent application number | Description | Published |
20090113286 | SYSTEM FOR PROCESSING MIXED-FORMAT FILES - A method, medium and implementing processing system are provided for book marking a combination of frame URLs within a frameset and allowing the sharing on multiple PCs the saved form data that may have been filled in. The system uses an image as a hotspot, containing a complex target destination in the form of an XML structure with multiple URLs for multiple frames as well as captured form data. This system combines file types such as XML and JPG, e.g. as in sample file name ‘MyCapturedFramesAndFormData.XML.JPG’ or ‘MyCapturedFramesAndFormData.XML.GIF’. This combination provides a surprising effect compared to the prior systems, namely, launching the image in an enhanced web browser or in a web browser containing a new plug-in, displays the frame just as it was when saved, including frame set and data input to displayed forms. | 04-30-2009 |
20090113290 | SYSTEM FOR CAPTURING FRAMES AND FORM DATA - A method, medium and implementing processing system are provided for book marking a combination of frame URLs within a frameset and allowing the sharing on multiple PCs the saved form data that may have been filled in. The system uses an image as a hotspot, containing a complex target destination in the form of an XML structure with multiple URLs for multiple frames as well as captured form data. This system combines file types such as XML and JPG, e.g. as in sample file name ‘MyCapturedFramesAndFormData.XML.JPG’ or ‘MyCapturedFramesAndFormData.XML.GIF’. This combination provides a surprising effect compared to the prior systems, namely, launching the image in an enhanced web browser or in a web browser containing a new plug-in displays the frame just as it was when saved. | 04-30-2009 |
20090117347 | DISPLAY APPARATUS - A display apparatus that includes a mask layer composed of transparent portions and opaque portions, the mask layer being superimposed over a pattern layer comprising light portions and dark portions. The mask layer can be moved relative to the pattern layer between a first position, whereby certain portions on the pattern layer are selectively obscured, and a second position whereby other portions on the pattern layer are selectively obscured. The mask layer can be moved relative to the second level by the movement of an actuating member coupled thereto as a function of ambient physical conditions. The ambient conditions may include, for example, temperature, pressure, humidity, acidity, voltage, fill level and the like. | 05-07-2009 |
20090282464 | SYSTEM AND METHOD FOR AUTHENTICATING AN END USER - A system and associated method for authenticating an end user. The method comprises generating a first mask in response to an authentication request from an end user, the first mask comprising a set of root nodes, a set of server nodes, and a set of client nodes each being unique to the end user. Next, determining the authenticity of the end user based on comparing data received from the end user with nodes contained in the first mask. The data comprising a set of nodes selected by the end user and the end user having selected the data in response to the first mask. | 11-12-2009 |
20100024004 | METHOD AND SYSTEM FOR SECURING ACCESS TO AN UNSECURE NETWORK UTILIZING A TRANSPARENT IDENTIFICATION MEMBER - A method, system and computer-usable medium for providing secure access to an application over an unsecure network. A transparent identification member can be physically placed by a user against a login interface, the transparent identification member possessing a filter for filtering and displaying a pattern unique to the login interface. Thereafter, the user can be automatically permitted to authenticate an unsecure network and securely access an application over the unsecure network, in response to placing the transparent identification member against the login interface and providing a user input at a physical location on the login interface corresponding to the pattern unique to the login interface, thereby providing a secure authentication for the user to perform secure transactions over the unsecure network and preventing phishing by others with respect to the user and the unsecure network. | 01-28-2010 |
20100070622 | SYSTEM AND METHOD FOR UTILIZING SYSTEM LAG TO SEND FACTS TO AN END USER - A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length. | 03-18-2010 |
20100138657 | System and method for authenticating an end user - A method for authenticating an end user. The method starts by generating a first pattern in response to receiving an authentication request from the end user. Next, the method continues by generating a second pattern in response to receiving confirmation that the end user received the first pattern; the second pattern comprising multiple colored nodes. Then the method determines the authenticity status of the end user by comparing data sent by the end user with the second pattern. The end user having generated the data by overlaying a transparent credit card on top of the second pattern and selecting at least one node which displays a color other than black. Finally, the method sends the determined authenticity status to the end user via an output device. | 06-03-2010 |
20100138912 | System and method for authenticating an end user - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 06-03-2010 |
20100205547 | CASCADING MENUS FOR REMOTE POPPING - A pop reader of a browser searches HTML code for a webpage with a plurality of links for a first link specified with a first target file name comprising a pop type element. The pop reader, responsive to detecting the first link specified with the first target file name comprising the pop type element, inserts a first command into the HTML code to disable the first link and set an event to pop up a first menu layer of a plurality of layers of a cascading menu and inserts a second command to specify the content of the first menu layer from a file accessed for the first target file name. The browser, responsive to detecting the event, displays the first menu layer with the specified content by the second command within the interface displaying the webpage. | 08-12-2010 |
20120141031 | ANALYSING CHARACTER STRINGS - A method for analyzing a character string, the method including: analyzing a character string to determine one of more characters of the character string; determining from a dictionary source, an alternative character string to the analyzed character string; comparing the analyzed character string with the alternative character string to determine a weighting factor for each of the characters of the analyzed character string relative to the positional arrangement of the characters in the alternative character string; and for each determined weighting factor, generating for each of the characters in the analyzed character string a corresponding character of a particular size as determined by the weighting factor. | 06-07-2012 |
20120204229 | METHOD AND SYSTEM FOR AUTHENTICATING AN END USER - A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask. | 08-09-2012 |
20120204230 | AUTHENTICATION OF AN END USER - A method and System for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device. | 08-09-2012 |
20120210411 | PROCESS FOR AUTHENTICATING AN END USER - A process for authenticating an end user. A first pattern of colored quadrilaterals is generated. A second pattern of multiple colored nodes that include a first subset of nodes is generated. The first and second patterns are sent to the end user. If a transparent credit card is overlaid by the end user on top of the second pattern, then a second subset of nodes in the credit card would match in color and location the first subset of nodes. The authenticity status of the end user is determined by determining whether each node of a third subset of nodes within the second subset of nodes (i) corresponds to a unique node of the multiple colored nodes and (ii) has a color that matches a specific color in one quadrilateral of the colored quadrilaterals. The determined authenticity status is sent to the end user via an output device. | 08-16-2012 |
20120254990 | AUTHENTICATION OF AN END USER - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 10-04-2012 |
20120284669 | DISPLAY OF SLIDES ASSOCIATED WITH DISPLAY CATEGORIES - A method and system for displaying slides associated with display categories. Display categories are simultaneously displayed, each display category including display sets, each display set including a set of slides. A first row of buttons is displayed for a selected display category. Each button in the first row of buttons corresponds to a different display set in the selected display category such that each display set is represented by a different button in the first row of buttons. A second row of buttons is displayed simultaneous with the displayed first row of buttons. Each button in the second row of buttons corresponds to a different slide in the display set selected via selection of the first button in the first row of buttons. The slide corresponding to the selected second button is displayed simultaneous with the displayed first row of buttons and the displayed second row of buttons. | 11-08-2012 |
20130080878 | System for Processing Mixed-Format Files - A method, medium and implementing processing system are provided for book marking a combination of frame URLs within a frameset and allowing the sharing on multiple PCs the saved form data that may have been filled in. The system uses an image as a hotspot, containing a complex target destination in the form of an XML structure with multiple URLs for multiple frames as well as captured form data. This system combines file types such as XML and JPG, e.g. as in sample file name ‘MyCapturedFramesAndFormData.XML.JPG’ or ‘MyCapturedFramesAndFormData.XML.GIF’. This combination provides a surprising effect compared to the prior systems, namely, launching the image in an enhanced web browser or in a web browser containing a new plug-in, displays the frame just as it was when saved, including frame set and data input to displayed forms. | 03-28-2013 |
20130254863 | AUTHENTICATION OF AN END USER - A method and system for authenticating access of secure information by a user device. An authentication request for accessing the secure information is received, the authentication request including a user identifier of a user at the user device. A position of a secret quadrilateral within a first pattern of colored quadrilaterals is determined and is identifiable by the user identifier; the secret quadrilateral includes an authenticating color. The first pattern of colored quadrilaterals including the secret quadrilateral is generated. A second pattern including colored nodes that include the authenticating color at positions within a transparent authenticating card assigned to the user. The first pattern and the second pattern are sent to the user. Location information from the user device is received. It is determined that the subset of nodes that include the authenticating color, which allows access to the secure information by the user device. | 09-26-2013 |
20140040140 | AUTHENTICATION OF AN END USER - A method, system, and computer program product for authenticating an end user. A login field is generated and sent to an end user, and a set of nodes is subsequently received from the end user. The login field includes first colored nodes having multiple colors distributed in a first random pattern. A transparent credit card controlled by the end user includes second colored nodes having multiple colors distributed in a second random pattern. An authenticity status of the end user is determined, and then sent to the end user, by determining whether each node of the set of nodes (i) corresponds to a unique node of the first colored nodes and (ii) has a same color determined by a function of a static integer and a dynamic integer D, wherein S and D are known only to the end user and the provider of the transparent credit card. | 02-06-2014 |
20150073803 | SMOOTHENING THE INFORMATION DENSITY OF SPOKEN WORDS IN AN AUDIO SIGNAL - A portion of an audio signal is identified corresponding to a spoken word and its phonemes. A set of alternate spoken words satisfying phonetic similarity criteria to the spoken word is generated. A subset of the set of alternate spoken words is also identified; each member of the subset shares the same phoneme in a similar temporal position as the spoken word. A significance factor is then calculated for the phoneme based on the number of alternates in the subset and on the total number of alternates. The calculated significance factor may then be used to lengthen or shorten the temporal duration of the phoneme in the audio signal according to its significance in the spoken word. | 03-12-2015 |