Patent application number | Description | Published |
20080229231 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONSOLIDATING WEB PAGES DISPLAYED IN MULTIPLE BROWSERS - Methods, systems, and computer program products for consolidating Web pages displayed in multiple browsers at a computer processing device are provided. A method includes generating an information file in response to initiation of a browser instance and creating a file record for each web page accessed during the browser instance. The file record includes session history data for each web page. The method also includes consolidating each of the file records from the information file with other file records from another information file created in response to another browser instance. The method further includes displaying a single view of browser activity corresponding to the browser instance and the other browser instance resulting from the consolidation. | 09-18-2008 |
20080238614 | METHOD AND SYSTEM FOR SECURING AND RECOVERING A WIRELESS COMMUNICATION DEVICE - A method of securing a wireless device, includes: receiving, from a subscriber, a request to activate one or more security features and recovery functions of a missing wireless device; determining whether the wireless device is powered on; setting, in the event the wireless device is not powered on, a flag in an account of the subscriber to activate the requested functions upon determining the wireless device is powered on; activating, upon determining the wireless device is powered on, the requested functions by blowing at least one of a series of electrically programmable fuses included within the wireless device; and deactivating by blowing at least another of a series of electrically programmable fuses, in the event of receiving another request from the subscriber, the one or more security features and recovery functions, so as to reinstate a set of standard operating features of the wireless device. | 10-02-2008 |
20080289035 | METHOD AND SYSTEM FOR PREVENTING PASSWORD THEFT THROUGH UNAUTHORIZED KEYLOGGING - A method for preventing password theft through unauthorized keylogging includes detecting, from a host application, a request for a password input by a user of an input keyboard device; activating a randomly generated keyboard map uniquely associated with the host application such that a first set of keystroke values inputted by the user results in a second, converted set of keystroke values transmitted to the host application, in accordance with the randomly generated keyboard map uniquely associated therewith; and upon completion of a password entry process by the user, deactivating the randomly generated keyboard map such that subsequent keystroke values inputted by the user are no longer converted to the values according to the keyboard map. | 11-20-2008 |
20090034604 | METHOD AND SYSTEM FOR SUBDIVIDING A DIGITAL BROADCAST PROGRAM INTO DISTINCT IDENTIFIED SECTIONS FOR SELECTIVE DIGITAL VIDEO RECORDING AND ARCHIVING - A method for subdividing audio/video (A/V) content, includes: labeling a series of A/V content as individual sections; assembling the individual sections of the A/V content into a continuous series of segments; wherein a segment includes part or all of a section of A/V content; assigning sub-section identification to each segment of the continuous series of segments; wherein the sub-section identification is timestamp coordinated with the series of segments, and specifies a segment description, and timing control records for the A/V content within a segment; wherein the timing control records comprise start times and end times for each segment; and wherein the subdivision of the A/V content into identifiable sub-sections facilitates selective archiving, recording, and playback. | 02-05-2009 |
20090037374 | METHOD AND SYSTEM FOR REPORTING AND RELATING FIREARM DISCHARGE DATA TO A CRIME REPORTING DATABASE - A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm. | 02-05-2009 |
20090066543 | METHOD FOR IMPLEMENTING DYNAMIC PSEUDORANDOM KEYBOARD REMAPPING - A method of implementing dynamic pseudorandom keyboard remapping of a system including a keyboard in communication with an operating system of a computing device includes encrypting an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and decrypting the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard to the operating, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value. | 03-12-2009 |
20090070595 | SYSTEM FOR IMPLEMENTING DYNAMIC PSEUDORANDOM KEYBOARD REMAPPING - A system for implementing dynamic pseudorandom keyboard remapping includes a keyboard in communication with an operating system of a computing device; the keyboard configured to encrypt an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and the operating system configured to decrypt the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard thereto, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value. | 03-12-2009 |
20090070805 | METHOD AND SYSTEM FOR OPTIONAL SUPPRESSION OF TELEVISION BROADCAST LOW-PRIORITY GRAPHIC INTERRUPTIONS - A method for suppressing graphical overlays in video content, includes: generating a digital signal, the digital signal including a primary video feed subject to graphic overlays, a data stream, and an audio stream; wherein the primary video feed is; inserting steganographic information into the primary video feed; inserting alternative video information into the data stream; wherein the alternative video information is free of graphic overlays; substituting the alternative video information within the primary video feed based on the steganographic information; and wherein the substitution of the alternative video information suppresses at least a portion of the graphic overlay information. | 03-12-2009 |
20090125993 | METHOD FOR PROTECTING AGAINST KEYLOGGING OF USER INFORMATION VIA AN ALTERNATIVE INPUT DEVICE - A method for protecting against keylogging, the method includes: detecting from a host browser application, a request for a password input by a user of an alphanumeric input device in an entry field of a transaction; inserting a temporary indicator password in the entry field; sending an identifier of the host application with the temporary indicator password to an alternative device; retrieving a user assigned password stored in a table in the alternative device in response to matching the identifier of the host application and the temporary indicator password; sending the user assigned password to the host application; inserting the user assigned password in place of the temporary indicator password in the entry field; and sending the transaction to a server for verification and further processing. | 05-14-2009 |
20090187640 | IN-FLIGHT INFORMATION SYSTEM - A system for implementing an in-flight passenger information system includes one or more ground-based servers in network communication with an airplane-based server, the one or more ground-based servers configured to execute a computer application for accessing a database containing airport infrastructure information and passenger transactional information; and the airplane-base server in communication with one or more passenger accessible input/output devices; wherein the one or more passenger accessible input/output devices are configured to communicate to a passenger, while onboard an airplane, passenger-selected portions of the airport infrastructure information and passenger transactional information specific to the passenger. | 07-23-2009 |
20090188659 | SYSTEM AND METHOD FOR IMPLEMENTING A FRONT DOOR AIR TO WATER HEAT EXCHANGER - A system for cooling of electronic equipment enclosures, the system includes: enclosures with front and rear doors for holding assemblages of electronics; front and rear heat exchangers housed within each of the front and rear doors, respectively; a series of separate supply lines configured with control valves and flow control sensors that provide liquid coolant to each of the heat exchangers; a series of separate return lines configured with temperature sensors for exiting coolant from each of the heat exchangers; separate air purging valves for each of the supply and return lines; a series of spray shields for preventing coolant leaks from entering an inlet airflow, and to protect the assemblages of electronics from coolant leaks; wherein the control valves are actuated by a controller in response to readings from the temperature and flow control sensors to separately control coolant flow to each of the front and rear heat exchangers. | 07-30-2009 |
20090189977 | SYSTEM AND METHOD FOR SPOTLIGHT IDENTIFICATION OF AUDIENCE MEMBERS DURING QUESTION AND ANSWER SESSIONS - A system for identifying audience members and sequencing audience participation, the system includes: a computing device with logic and storage devices electrically connected audience member control panels, audience identification devices, and a moderator or speaker user interface; wherein the audience control panels are configured for individual audience members to make requests; wherein the computing device: receives the audience member requests and position identifiers and places them in a sequential list in the order received; records position identifiers for the audience members in the sequential list; sends the sequential list to the moderator or speaker; retrieves audience member seat coordinates in response to the recorded position identifiers; calculates actuation commands to control the audience identification devices; actuates the audience identification devices to highlight or focus on an audience member; and activates a microphone located in the vicinity of the recognized audience member, while disabling additional audience member microphones. | 07-30-2009 |
20090190027 | METHOD AND SYSTEM FOR ASPECT RATIO CONTROL - A method for viewer based control of video display aspect ratios, the method includes: applying an initial video display aspect ratio to a selected signal source; determining if the selected signal source has a viewer assigned video display aspect ratio; modifying the initial video display aspect ratio of the selected signal source in response to the viewer assigned video display aspect ratio; wherein the viewer assigned video display aspect ratio is a subset of one or more of the viewer assigned video display aspect ratios that are stored in a non-volatile memory medium; wherein the one or more viewer assigned video display aspect ratios are each individually associated with a signal source; and wherein a viewer assigned video display aspect ratio is retrieved from the non-volatile memory medium in response to the selection of an associated signal source. | 07-30-2009 |
20090190778 | METHOD AND SYSTEM FOR ASSIGNING INDEPENDENT AUDIO VOLUME SETTINGS TO COMPONENTS, CHANNELS, AND MEDIA CONTENT - A method for amplifier volume specification and control, the method includes: applying an initial volume level to an amplifier; determining one or more of: which A/V component has been selected for use, which channel or frequency is being outputted, and the type of outputted A/V content; modifying the initial amplifier volume level with one or more stored volume level settings in response to at least one of the following: the determined A/V component in use; the selected channel and frequency outputted, and the type of outputted A/V content; wherein the one or more stored volume level settings include: received volume level settings for audio/video (A/V) components; received volume level settings for selected channels and frequencies that are outputted by the A/V components; and received volume level settings for A/V content. | 07-30-2009 |
20090201131 | Embedded RFID Verifiable Currency - A system and method of determining likelihood of counterfeiting without inspection of currency compares signals returned by uniquely customized RFID chips when interrogated, preferably incident to a transaction. The RFID information is compared to RFID information for bills known to be in circulation in order to validate a given currency bill. Usage patterns can be determined from statistical analysis of such reports and reported usage patterns will statistically differ significantly if not radically with the number of RFID chips returning the same RFID information and such differences will increase in either or both of geographic locations of reports and frequency of reports with increase of the number of bills having duplicated RFID chips. The basic infrastructure for practice of the invention is also capable of tracking genuine currency following, for example, a theft or other criminal activity. | 08-13-2009 |
20090299759 | METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE - A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address. | 12-03-2009 |
20090300749 | METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE - A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with asymmetric public-key cryptography using a public key; building a transaction consisting of the IPPW and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address. | 12-03-2009 |
20100050242 | GRAPHICAL PASSWORD AUTHENTICATION BASED ON PIXEL DIFFERENCES - A password, unknown to a user to be authenticated by the password, is created by comparing an image provided by the user to a master image. Random differences between the images are found and used to create the password. The password is then validated to determine whether the user is authorized and/or to determine whether a communication provided by the user is to be processed. | 02-25-2010 |
20100070683 | METHOD TO MONITOR READ/WRITE STATUS OF FLASH MEMORY DEVICES - A method and flash memory device employing the method includes a flash memory device having a logic routine saved on the flash memory being a computer readable medium. The flash memory device generates a plurality of memory inputs and outputs. The logic routine determines a memory input and/or memory output operation, and incrementally counts memory inputs and memory outputs using a counter function of the logic routine. The logic routine determines the total number of the plurality of memory inputs and outputs using the counter function. Additionally, the logic routine generates an alert signal when the total number of the memory inputs and outputs exceeds a predetermined value programmed in the logic routine. | 03-18-2010 |
20100073402 | METHOD OF AUTOMATIC CROPPING - A method for rectangular cropping including the steps of: (i) providing a sequence of images on a graphical interface device; (ii) analyzing each pixel in the first image included in the sequence of images; (iii) locating a boundary between the background of the first image and the border of the first image; (iv) determining the degree off true horizontal of the first image; (v) rotating the first image based on the determining step; (vi) applying a cropping operation to the first image; and (vii) automatically applying the cropping operation to each other image in the sequence of images. | 03-25-2010 |
20100079303 | MONITORING OBJECTS IN MOTION ALONG A STATIC ROUTE USING SENSORY DETECTION DEVICES - A system for monitoring a plurality of objects in motion (OIMs) along a static route using a plurality of sensory detection devices, the static route having a plurality of route portions, each route portion having an entering boundary and an exiting boundary, at least one OIM being a designated OIM and having a tag indicating the location of the designated OIM along the route, the system comprising a plurality of sensory detection devices corresponding to the plurality of route portions for monitoring activity in each of the plurality of route portions and for providing monitor output representing activity within each of the plurality of route portions, a plurality of data stores corresponding to each of the plurality of route portions for receiving and storing the monitor output for each of the plurality of route portions, and a plurality of location detectors communicative with the tag of the designated OIM for identifying the location of the designated OIM, each location detector providing output when the designated OIM is located within a route portion. | 04-01-2010 |
20100085197 | SYSTEM AND METHOD OF DAMAGE PREVENTION FROM WEATHER OCCURRENCES - A method and system of damage prevention from weather occurrences is provided wherein incoming notifications from weather services are used to take action on user specified and configurable powered devices. Threshold levels may be set based on severity of weather occurrences. The threshold levels may be reset or reconfigured by a user of the system. Different threshold levels may be set for different devices in order that different devices may be deactivated at different threshold levels. | 04-08-2010 |
20100100948 | RULES DRIVEN MULTIPLE PASSWORDS - A rules driven multiple passwords system is provided wherein a list of stored passwords are used in rotation over time in accordance with a set of rules or conditions managed by the system. With such an arrangement, the currently active password of a system User may automatically be changed, in accordance with the rules or conditions, to the next password in the list. The User is notified as to the newly assigned password. | 04-22-2010 |
20100102938 | METHOD OF ACTIVATING A SUPPLEMENTAL VISUAL WARNING SIGNAL BASED ON FREQUENCY EMITTED FROM A GENERATOR OF A PRIMARY AUDIBLE WARNING SIGNAL - A system and method for signaling users including a control device electrically connected to a transceiver. The transceiver has a specified frequency. A first mobile signal device being activated by a first user and electrically communicating with a first transmitter having a selectable signal frequency. The first transmitter electrically communicates with the transceiver using the specified frequency. A second signal device includes a second receiver for receiving an activation signal from the transceiver. The second receiver electrically communicates with the transceiver using the specified frequency. The second signal device is activated by the activation of the first mobile signal device using the transceiver for alerting other persons. | 04-29-2010 |
20100121563 | REAL-TIME PERSONAL DEVICE TRANSIT INFORMATION PRESENTMENT - Methods, including service methods, articles of manufacture, systems, articles and programmable devices provide personalized, real-time travel information to a passenger of a transit system. A passenger provides a destination input to a programmable personal digital assistant, which establishes wireless communication with a wireless broadcast system of a transit system and uploads current routing and scheduling information, processing and presenting information to the passenger as a function of destination and passenger preference. The personal digital assistant also selects and wirelessly locates and communicates directly with the identified transport, alerts the passenger of a recommended boarding opportunity, recognizes a boarding by the passenger, confirms that a boarded transport is the recommended transport, and communicates a disembark alert to if the boarded transport is not the recommended transport or upon an arrival at a destination, the alert configured pursuant to the passenger preference. | 05-13-2010 |
20100139992 | USER-AUTHENTICATING, DIGITAL DATA RECORDING PEN - A user-authenticating, digital data recording pen is provided. User-authenticating includes: using the digital data recording pen to write out by a user a handwritten password, which includes a handwritten character string to be authenticated; digitally comparing by the digital data recording pen the handwritten password to at least one handwritten password pre-stored for the user in the digital data recording pen; authenticating by the digital data recording pen the user if the handwritten password is within a defined tolerance of the pre-stored handwritten password; and if authenticated, associating by the digital data recording pen an indication of user authentication with data, such as a writing, of the user produced using the digital data recording pen. In one embodiment, the writing could be any alpha-numerical character string of the user interacting with a system via the digital data recording pen. | 06-10-2010 |
20100146602 | CONDITIONAL SUPPLEMENTAL PASSWORD - A password protected machine where a primary alternative password and a secondary alternative password are assigned, but the secondary alternative password cannot be used to gain access unless and until the primary alternative password has been deactivated. Also, a password protected machine where a user is assigned at least two alternative passwords, and where the use of one alternative password will automatically deactivate the other password. Preferably, there is a primary password and a secondary password such that: (i) the use of the primary password does not deactivate the secondary password, but (ii) the use of the secondary password does deactivate the primary password. | 06-10-2010 |
20100153451 | Multifactor authentication with changing unique values - A method of authentication includes the steps of providing a transaction service provider having a secure server; providing a user; requesting access authorization to the server of the service provider by the user, the server storing a set of use parameters obtained from the authorization access request, the use parameters including at least several prior location coordinates, methods of access, transaction information and access hardware used during the authentication to be used by the transaction service provider in subsequent requests by the user to access the server, the use parameters used in the authentication to be continually updated with the most recent data. | 06-17-2010 |
20100171640 | Method and System for Controlling and Adjusting Traffic Light Timing Patterns - The present invention relates to methods and systems for controlling and adjusting traffic light timing patterns, and more particularly, to a method and system for controlling and adjusting traffic light timing patterns based on input variables related to known or predicted events, and for gradually changing traffic light intervals over time. | 07-08-2010 |
20100262509 | METHOD AND SYSTEM OF PRESERVING PURCHASED ON-DEMAND TRANSPORTATION ENTERTAINMENT SERVICES ACROSS DIFFERENT JOURNEY SEGMENTS OR SEPARATE TRIPS - A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight. | 10-14-2010 |
20120186790 | IMPLEMENTING A FRONT DOOR AIR TO WATER HEAT EXCHANGER - A system for cooling of electronic equipment enclosures, the system includes: enclosures with front and rear doors for holding assemblages of electronics; front and rear heat exchangers housed within each of the front and rear doors, respectively; a series of separate supply lines configured with control valves and flow control sensors that provide liquid coolant to each of the heat exchangers; a series of separate return lines configured with temperature sensors for exiting coolant from each of the heat exchangers; separate air purging valves for each of the supply and return lines; a series of spray shields for preventing coolant leaks from entering an inlet airflow, and to protect the assemblages of electronics from coolant leaks; wherein the control valves are actuated by a controller in response to readings from the temperature and flow control sensors to separately control coolant flow to each of the front and rear heat exchangers. | 07-26-2012 |
20120191490 | METHOD AND SYSTEM OF PRESERVING PURCHASED ON-DEMAND TRANSPORTATION ENTERTAINMENT SERVICES ACROSS DIFFERENT JOURNEY SEGMENTS OR SEPARATE TRIPS - A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight. | 07-26-2012 |
20120197747 | METHOD AND SYSTEM OF PRESERVING PURCHASED ON-DEMAND TRANSPORTATION ENTERTAINMENT SERVICES ACROSS DIFFERENT JOURNEY SEGMENTS OR SEPARATE TRIPS - A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight. | 08-02-2012 |
20120210265 | DESIGNING TASK EXECUTION ORDER BASED ON LOCATION OF THE TASK ICONS WITHIN A GRAPHICAL USER INTERFACE - A method, system and computer program product for designating the order in which a plurality of tasks are to be executed on a computer system. In one embodiment, a plurality of task icons, each of which represents a respective one task, are shown in defined positions in a view on the computer system, and these defined positions of the task icons are used to determine the order in which the tasks are to be executed by the computer system. In an embodiment, the task icons are shown in a grid pattern, having rows and columns. Tasks represented by task icons shown in successive rows of the grid pattern are executed in series, and tasks represented by task icons shown in the same row of the grid pattern are executed in parallel. In an embodiment, at least one of the task icons represents an embedded executable workflow folder. | 08-16-2012 |
20130024772 | COMPUTER-BASED DISPLAY PRESENTATION TIME MANAGEMENT SYSTEM - An interactive computer supported display system for managing the time allocation of presentation segments, such as individual slides. The presentation segments are each preassigned a presentation time duration and a warning time threshold for signaling the approach to the end of the preassigned time duration of each presentation segment. The actual presentation time used during presentation of each segment is compared to the preassigned time duration and warning threshold to issue warnings to the presenter and to carry forward any surplus or deficit time due to underrun or overrun of the preassigned time. The time surplus or deficit carried forward may be allocated by adding to or subtracting from the preassigned presentation times of subsequent presentation segments based upon a preassigned priority level assigned to each presentation segment. | 01-24-2013 |
20140029811 | USER-AUTHENTICATING, DIGITAL DATA RECORDING PEN - A user-authenticating, digital data recording pen is provided. User-authenticating includes: using the digital data recording pen to write out by a user a handwritten password, which includes a handwritten character string to be authenticated; digitally comparing by the digital data recording pen the handwritten password to at least one handwritten password pre-stored for the user in the digital data recording pen; authenticating by the digital data recording pen the user if the handwritten password is within a defined tolerance of the pre-stored handwritten password; and if authenticated, associating by the digital data recording pen an indication of user authentication with data, such as a writing, of the user produced using the digital data recording pen. In one embodiment, the writing could be any alpha-numerical character string of the user interacting with a system via the digital data recording pen. | 01-30-2014 |
20140129473 | METHOD FOR REPORTING AND RELATING FIREARM DISCHARGE DATA TO A CRIME REPORTING DATABASE - A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm. | 05-08-2014 |
20140325591 | RULES DRIVEN MULTIPLE PASSWORDS - A rules driven multiple passwords system is provided wherein a list of stored passwords are used in rotation over time in accordance with a set of rules or conditions managed by the system. With such an arrangement, the currently active password of a system User may automatically be changed, in accordance with the rules or conditions, to the next password in the list. The User is notified as to the newly assigned password. | 10-30-2014 |