Patent application number | Description | Published |
20080216070 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR PROVIDING WEB-BASED ELECTRONIC RESEARCH AND PRESENTATION FUNCTIONS VIA A DOCUMENT CREATION APPLICATION - An exemplary embodiment of the invention relates to a method, system, and storage medium for providing web-based electronic research and presentation functions via a document creation application. The method includes scanning an active document on a computer to identify relevant keywords, searching a database for reference materials relating to the relevant keywords, and displaying relevant reference materials on the computer. The method further includes deploying process software for providing the web-based electronic research and presentation functions via a document creation application. The deployment includes installing the process software on a server, identifying server addresses for users accessing the process software on the server, sending the process software to the server and copying the process software to a file system of the server. The deployment also includes sending the process software to a client computer and executing the process software on the client computer. | 09-04-2008 |
20080230594 | SECURE VOTING SYSTEM - Methods, systems and program products for securely voting by providing a secure voting module in communication with a voting device. A voter signs onto the voting device using a unique voter identification, and the voter's voting selections are written to the voting device. A scrambled voter identification is generated using the unique voter identification and a unique encryption value of the secure voting module, whereby the voting selections and the scrambled voter identification are stored in the secure voting module. Once voting has ended, first and second fuses are blown within the secure voting module for destroying the unique encryption value and for permanently storing the voting selections and scrambled voter identification in a read only secure voting module that maintains voter anonymity while preventing any further physically writing thereto. The voting results may then be counted, re-counted or validated. | 09-25-2008 |
20080235145 | METHOD, SYSTEM, AND STORAGE MEDIUM FOR PROVIDING WEB-BASED ELECTRONIC RESEARCH AND PRESENTATION FUNCTIONS VIA A DOCUMENT CREATION APPLICATION - An exemplary embodiment of the invention relates to a method, system, and storage medium for providing web-based electronic research and presentation functions via a document creation application. The method comprises scanning an active document on a computer device for identifying relevant keywords, and searching at least one database for reference materials relating to the relevant keywords. The active document includes data currently being entered or edited by a user on the computer device. Results relevant to the active document are automatically shown on the computer screen. The method also includes converting the reference materials if they are in a format different from the format used in creating the active document, and displaying the converted reference materials on the computer device. Embodiments of the invention also include a system and a storage medium. | 09-25-2008 |
20080284571 | SYSTEM FOR UTILIZING RFID TAGS TO MANAGE AUTOMOTIVE PARTS - A system for utilizing RFID tags to manage automotive parts. A system is provided that includes a radio frequency identification (RFID) reader configured to read data from RFID tags affixed to parts located throughout a vehicle, wherein each RFID tag uniquely identifies a part; a data processing system configured to process the data obtained by the RFID reader; and a service application that provides service related information to an end user based on an installation or removal of a part from the vehicle. | 11-20-2008 |
20080289035 | METHOD AND SYSTEM FOR PREVENTING PASSWORD THEFT THROUGH UNAUTHORIZED KEYLOGGING - A method for preventing password theft through unauthorized keylogging includes detecting, from a host application, a request for a password input by a user of an input keyboard device; activating a randomly generated keyboard map uniquely associated with the host application such that a first set of keystroke values inputted by the user results in a second, converted set of keystroke values transmitted to the host application, in accordance with the randomly generated keyboard map uniquely associated therewith; and upon completion of a password entry process by the user, deactivating the randomly generated keyboard map such that subsequent keystroke values inputted by the user are no longer converted to the values according to the keyboard map. | 11-20-2008 |
20080294715 | Privacy Safety Manager System - A method is provided for accessing user personal information. In such method, personal information belonging to a particular user is stored at a user information processing system such as a user computer. A form may then be displayed on the user information processing system. A user-provided recall input can then be received at the user information processing system and the fact of its receipt can be indicated on the form. Using the recall input, the stored user personal information can be accessed for processing in connection with the displayed form. Display of information at the user information processing system may then be manipulated based on a result of the processing. | 11-27-2008 |
20090019016 | METHOD AND SYSTEM FOR FINDING INFORMATION IN EMAIL UPON OBTAINING SEARCH PERMISSION - Disclosed is a method for finding information contained in email, the method including linking a plurality of email databases with a computing resource operated by a primary user, the plurality of email databases including a primary database operated by the primary user and at least one secondary database operated by at least one secondary user. The method also includes determining criteria to be searched in the email databases, requesting permission from the secondary users to search the secondary databases for the criteria, and obtaining permission from the secondary users to search the secondary databases at the discretion decision of the secondary user. The method further includes employing a universal interface adapter to search the email databases, searching for the criteria in the email databases for which the permission was obtained, finding information including the criteria via the searching, and receiving the information at the primary computing resource. | 01-15-2009 |
20090031425 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR DETECTING ALTERATION OF AUDIO OR IMAGE DATA - Using metadata to detect alteration of data. A first set of metadata characteristics including at least one respective semantic description are recorded for a first set of data representing original data. A second set of metadata characteristics including at least one corresponding semantic description are recorded for a second set of data representing data under test. The first and second sets of metadata characteristics are compared. If the first and second sets of metadata characteristics are not identical, these sets are processed to identify locations in the first set of data that have been altered. Using the at least one semantic description for the first set of data and the at least one corresponding semantic description for the second set of data, one or more metadata characteristics that have changed from the first set of data to the second set of data are identified. | 01-29-2009 |
20090034604 | METHOD AND SYSTEM FOR SUBDIVIDING A DIGITAL BROADCAST PROGRAM INTO DISTINCT IDENTIFIED SECTIONS FOR SELECTIVE DIGITAL VIDEO RECORDING AND ARCHIVING - A method for subdividing audio/video (A/V) content, includes: labeling a series of A/V content as individual sections; assembling the individual sections of the A/V content into a continuous series of segments; wherein a segment includes part or all of a section of A/V content; assigning sub-section identification to each segment of the continuous series of segments; wherein the sub-section identification is timestamp coordinated with the series of segments, and specifies a segment description, and timing control records for the A/V content within a segment; wherein the timing control records comprise start times and end times for each segment; and wherein the subdivision of the A/V content into identifiable sub-sections facilitates selective archiving, recording, and playback. | 02-05-2009 |
20090034802 | METHOD AND SYSTEM FOR IMAGE RECOGNITION FOR AIDING THE VISUALLY IMPAIRED - A method for tracking paper currency in a holder, includes: scanning paper currency deposited or removed from a holder; determining the total number of each individual denomination of paper currency contained within the holder based on the scanned paper currency deposited and removed from the holder; recording the total number of each individual denomination of paper currency; determining the total value of the paper currency within the holder; outputting the denomination of paper currency when the paper currency is scanned during depositing or removal from the holder; outputting the recorded number of each individual denomination of paper currency and the total value of the currency within the holder; and wherein the recorded number of each individual denomination of paper currency and the total value of the currency within the holder is dynamically tabulated based on the scanning of paper currency deposited or removed from the holder. | 02-05-2009 |
20090037104 | METHOD AND SYSTEM FOR BLIND SPOT IDENTIFICATION AND WARNING UTILIZING PORTABLE AND WEARABLE DEVICES - A method for detecting and alerting a user of objects in their blind spots, includes: tracking movement and relative position of a user to one or more objects; determining a blind spot of the user; determining when at least one of the one or more objects occupies the blind spot of the user; and transmitting a signal to a user mobile device to perform an alarm operation when at least one of the one or more objects occupies the blind spot of the user. | 02-05-2009 |
20090037374 | METHOD AND SYSTEM FOR REPORTING AND RELATING FIREARM DISCHARGE DATA TO A CRIME REPORTING DATABASE - A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm. | 02-05-2009 |
20090063053 | METHOD AND SYSTEM FOR BLIND SPOT IDENTIFICATION AND WARNING UTILIZING VISUAL INDICATORS - A method for detecting and alerting a driver of vehicles in their blind spots, includes: tracking movement and relative position of a driver to one or more vehicles; determining one or more driver blind spots; determining when at least one of the one or more vehicles approaches one of the driver blind spots; determining when at least one of the one or more vehicles occupies one of the driver blind spots; activating one or more indicators in response to one or more vehicles approaching and occupying one of the driver blind spots; wherein the one or more indicators comprise light emitting diodes (LED), liquid crystal display (LCD), plasma, projected elements, and electroluminescent elements; and wherein a sequence and pattern of activating the one or more indicators is determined based on the relative position of the driver to the one or more vehicles. | 03-05-2009 |
20090066543 | METHOD FOR IMPLEMENTING DYNAMIC PSEUDORANDOM KEYBOARD REMAPPING - A method of implementing dynamic pseudorandom keyboard remapping of a system including a keyboard in communication with an operating system of a computing device includes encrypting an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and decrypting the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard to the operating, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value. | 03-12-2009 |
20090070595 | SYSTEM FOR IMPLEMENTING DYNAMIC PSEUDORANDOM KEYBOARD REMAPPING - A system for implementing dynamic pseudorandom keyboard remapping includes a keyboard in communication with an operating system of a computing device; the keyboard configured to encrypt an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and the operating system configured to decrypt the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard thereto, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value. | 03-12-2009 |
20090070805 | METHOD AND SYSTEM FOR OPTIONAL SUPPRESSION OF TELEVISION BROADCAST LOW-PRIORITY GRAPHIC INTERRUPTIONS - A method for suppressing graphical overlays in video content, includes: generating a digital signal, the digital signal including a primary video feed subject to graphic overlays, a data stream, and an audio stream; wherein the primary video feed is; inserting steganographic information into the primary video feed; inserting alternative video information into the data stream; wherein the alternative video information is free of graphic overlays; substituting the alternative video information within the primary video feed based on the steganographic information; and wherein the substitution of the alternative video information suppresses at least a portion of the graphic overlay information. | 03-12-2009 |
20090073112 | METHOD AND SYSTEM FOR DYNAMICALLY CONFIGURABLE TACTILE FEEDBACK FOR NAVIGATIONAL SUPPORT - A method for providing dynamically configurable tactile indicator signals on a control surface for navigational support, includes: detecting at least one of an operator's hands positioned on a control surface; routing control signals to a series of tactile sensors in proximity to the detected positions of at least one of the operator's hands; wherein the control signals actuate tactile feedback devices; wherein the control signals are based on navigational information; providing tactile feedback to the operator via the actuated tactile feedback devices; wherein the tactile feedback is dynamically configured in response to the number of operator hands detected on the control surface; and wherein the tactile feedback is dynamically configured in response to the position of at least one of the operators hands on the control surface. | 03-19-2009 |
20090081995 | SYSTEM FOR INTELLIGENT CONSUMER EARCONS - A system for implementing intelligent consumer earcons, includes: one or more communication devices for carrying out conversations between users and for playing of earcons; one or more tracking and monitoring devices; one or more servers configured with software for implementing the earcons; one or more storage devices for storing a database of earcons, and for storing user profile and preference databases; one or more networks configured for signal communication between the communication devices, the tracking and monitoring devices, the servers, and the storage devices; wherein the monitoring devices are configured to monitor the user, user audio content, and the user's environment; wherein the earcons are chosen from the database of earcons based on the user profile and preferences database; and wherein the playing of individual earcons from the database of earcons is based on the monitored user audio content and environment. | 03-26-2009 |
20090083249 | METHOD FOR INTELLIGENT CONSUMER EARCONS - A method for utilizing earcons, includes: forming a database of earcons; forming a user profile and preferences database; monitoring user audio content; monitoring the user environment; playing a series of earcons from the database of earcons on a user's communication device; wherein the series of earcons are chosen from the database of earcons based on the user profile and preferences database; and wherein the playing of individual earcons from the series of earcons is based on the monitored user audio content and environment. | 03-26-2009 |
20090113415 | SYSTEM FOR IMPORTING CALENDAR DATA FROM A COMPUTER SCREEN INTO A CALENDAR APPLICATION - An exemplary embodiment of the invention relates to a method, system, and storage medium for performing calendaring and reminder activities for a computer user. The method includes analyzing text displayed on a computer screen, identifying calendar parameters resulting from the analysis, creating a calendar entry record that includes a source of the calendar parameters, pasting the calendar parameters into the calendar entry record, and automatically storing the calendar entry record in a calendar application without opening the calendar application. Calendar parameters include at least one of a date, a time, a meeting type, and a subject. | 04-30-2009 |
20090125993 | METHOD FOR PROTECTING AGAINST KEYLOGGING OF USER INFORMATION VIA AN ALTERNATIVE INPUT DEVICE - A method for protecting against keylogging, the method includes: detecting from a host browser application, a request for a password input by a user of an alphanumeric input device in an entry field of a transaction; inserting a temporary indicator password in the entry field; sending an identifier of the host application with the temporary indicator password to an alternative device; retrieving a user assigned password stored in a table in the alternative device in response to matching the identifier of the host application and the temporary indicator password; sending the user assigned password to the host application; inserting the user assigned password in place of the temporary indicator password in the entry field; and sending the transaction to a server for verification and further processing. | 05-14-2009 |
20090132618 | ONLINE SYSTEM AND METHOD FOR RESTORING ELECTRONIC MEDIA ON ELECTRONIC STORAGE DEVICES - Copy protected materials are backed up or restored and made available for play on electronic media players through an online retrievable system. Corrupted segments of electronic media storage files are identified and located prior to being read, executed, or played. An uncorrupted copy from the network is then located, and software instructions provide for the storage of the uncorrupted segment of the file on electronic media player, merging the uncorrupted segment into the reading, executing, or playing of the electronic storage media file to seamlessly produce an output in real-time that is indistinguishable from the uncorrupted file. | 05-21-2009 |
20090187640 | IN-FLIGHT INFORMATION SYSTEM - A system for implementing an in-flight passenger information system includes one or more ground-based servers in network communication with an airplane-based server, the one or more ground-based servers configured to execute a computer application for accessing a database containing airport infrastructure information and passenger transactional information; and the airplane-base server in communication with one or more passenger accessible input/output devices; wherein the one or more passenger accessible input/output devices are configured to communicate to a passenger, while onboard an airplane, passenger-selected portions of the airport infrastructure information and passenger transactional information specific to the passenger. | 07-23-2009 |
20090190767 | SYSTEM AND METHOD FOR A DEVICE SOUND INTERFACE MANAGER - A system for regulating the volume and frequency content of audio producing devices, the system includes: one or more noise making objects (NMO) configured with individual sound control devices in electrical communication with a noise management server and one or more audio producing devices configured with individual sound control devices; wherein the sound control devices have electronic logic processing, storage, and communication capabilities; wherein the noise management server utilize the sound control devices to: determine whether the NMO are producing noise in the audible range of one or more audio producing devices; determine a noise characteristic of the one or more NMO; command the one or more NMO to send the noise characteristic to the one or more audio producing devices; and wherein the volume and frequency content of audio produced by the one or more audio producing devices is adjusted in response to the received noise characteristic. | 07-30-2009 |
20090192798 | METHOD AND SYSTEM FOR CAPABILITIES LEARNING - A method for task execution improvement, the method includes: generating a baseline model for executing a task; recording a user executing a task; comparing the baseline model to the user's execution of the task; and providing feedback to the user based on the differences in the user's execution and the baseline model. | 07-30-2009 |
20090193096 | SYSTEM AND PRODUCT FOR ROLE-BASED TAG MANAGEMENT FOR COLLABORATIVE SERVICES INTEGRATED WITHIN AN SOA - A tag management system for a user of a client-side portal application providing access to a set of services that include provisions for collaborative tagging of content comprises one or more data repositories configured to maintain one or more separate sets of tags, a messaging intermediary configured to provide access to the one or more data repositories and to provide for communication with the set of services, and a client-side agent configured to communicate with the set of services and access the one or more data repositories through the message intermediary to act on instructions provided by the user in one or more user roles. A set of tags corresponds to each service in each user role and specifies an available vocabulary for tagging content at that service. The agent is configured to access the one or more data repositories to load a first set of tags corresponding a user-specified service and a user-specified role, display the first set of tags to the user, and to communicate with the user-specified service to post tags selected by the user from the first set of tags to content at the user-specified service. | 07-30-2009 |
20090204624 | METHOD AND SYSTEM FOR PREFERENCES-BASED MAIL DISTRIBUTION AND DIGITAL POSTAL SERVICES - A system and method for collecting and storing communications preferences of recipients and delivering communications to a recipient in accordance with the recipient's preferences is disclosed herein. Preferably, the communications preferences consist of at least one mail formatting preference and at least one sending preference. The system automatically formats a message in accordance with the intended recipient's communications preferences stored in a profile table. In an alternative embodiment, the system provides for a prompting function that can alter the communications preferences in the event that a particular preference must be changed. This prompting function is also useful if recipient does not have a corresponding profile in the profile table. | 08-13-2009 |
20090210408 | METHOD AND SYSTEM FOR ROLE BASED SITUATION AWARE SOFTWARE - A method for role based situation aware software includes: mapping one or more users to one or more communities of practice (CoP); aggregating a series of tags from the one or more CoP to form an initial set of role-based tags; filtering the initial set of role-based tags based on user context elements to form context sensitive user-role tags; querying one or more information services based on the context sensitive user-role tags; aggregating information obtained from querying the one or more information services; and providing the aggregated information to the user as dynamic context related content. | 08-20-2009 |
20090234894 | METHOD AND SYSTEM FOR COLLABORATIVE LEARNING - A method for collaborative teaching and learning, while facilitating simultaneous and dynamic changes by multiple users, includes: receiving a command to add or modify an existing topic record in a series of topic records in response to a user request; creating a new record in the event the received command is to add a new topic record; generating a modify token in the event the received command is to modify an existing topic record; deleting the modify token in response to completion of modifying the existing topic record; wherein the modify token prevents additional users from editing the existing topic record, but allows for the existing record to copied and modified while the first user is modifying the existing topic record; and wherein a collaboration engine generates and manages the modify token. | 09-17-2009 |
20090265770 | SECURITY SYSTEM BASED ON QUESTIONS THAT DO NOT PUBLICLY IDENTIFY THE SPEAKER - A method and system for authenticating a user seeking access to a secured system in a public area. Access is granted when a user demonstrates sufficient knowledge of the user's personal characteristics stored in the system. The user initiates the access process by tapping into the stored characteristics without overtly stating information that may be overheard. The user statements reflect an awareness about the categories of user uniqueness without divulging details. The system response statements act to elicit further information from the user for response and the response statements are scored. After a cumulative score threshold is met, the user is granted access. | 10-22-2009 |
20090299759 | METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE - A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address. | 12-03-2009 |
20090300749 | METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE - A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with asymmetric public-key cryptography using a public key; building a transaction consisting of the IPPW and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address. | 12-03-2009 |
20100031160 | DYNAMICALLY MAPPING AND MAINTAINING A CUSTOMIZED METHOD SET OF TAGS PARTICULAR TO AN EXTENTION POINT - A method for consistently and dynamically mapping and maintaining a customized method set of tags particular to an extension point page, includes: extending static customized method content to the extension point page by: mapping static customized method content to an extension point page; wherein the extension point page is configured with collaborative content and dynamic content; filtering the dynamic content based on a set of tags associated with the extension point page; synchronizing the extension point page's tags to ensure that the dynamic content rendered in the extension point page has a set of updated tags to retrieve current syndicated content; wherein a method author defines the extension point page in the customized method; and wherein a method user views the extension point page. | 02-04-2010 |
20100034366 | PARTICIPANT ALERTS DURING MULTI-PERSON TELECONFERENCES - A method for alerting teleconference participants includes: activating a mute function in response to a participant command; tracking a teleconference's conversation audio; determining the level of alertness of a participant; determining whether the participant's name is detected in the teleconference audio; wherein in the event the participant's name is detected: determining whether the context in which the participant was addressed requires the participant to respond; wherein in the event the participant is required to respond: alerting the participant that the participant has been summoned and is required to make a response; providing a conversation summarization to the participant; and deactivating the participant's mute function. | 02-11-2010 |
20100050242 | GRAPHICAL PASSWORD AUTHENTICATION BASED ON PIXEL DIFFERENCES - A password, unknown to a user to be authenticated by the password, is created by comparing an image provided by the user to a master image. Random differences between the images are found and used to create the password. The password is then validated to determine whether the user is authorized and/or to determine whether a communication provided by the user is to be processed. | 02-25-2010 |
20100100948 | RULES DRIVEN MULTIPLE PASSWORDS - A rules driven multiple passwords system is provided wherein a list of stored passwords are used in rotation over time in accordance with a set of rules or conditions managed by the system. With such an arrangement, the currently active password of a system User may automatically be changed, in accordance with the rules or conditions, to the next password in the list. The User is notified as to the newly assigned password. | 04-22-2010 |
20100139992 | USER-AUTHENTICATING, DIGITAL DATA RECORDING PEN - A user-authenticating, digital data recording pen is provided. User-authenticating includes: using the digital data recording pen to write out by a user a handwritten password, which includes a handwritten character string to be authenticated; digitally comparing by the digital data recording pen the handwritten password to at least one handwritten password pre-stored for the user in the digital data recording pen; authenticating by the digital data recording pen the user if the handwritten password is within a defined tolerance of the pre-stored handwritten password; and if authenticated, associating by the digital data recording pen an indication of user authentication with data, such as a writing, of the user produced using the digital data recording pen. In one embodiment, the writing could be any alpha-numerical character string of the user interacting with a system via the digital data recording pen. | 06-10-2010 |
20100141778 | PHOTOGRAPH AUTHORIZATION SYSTEM - An electronic photographic device that automatically communicates an authorization signal that enables receivers of the authorization signal to authorize use of a likeness captured in a photographic image. The electronic authorization device includes an image capture mechanism for capturing the photographic image, a controller for initiating photographic authorization by generating an authorization signal at the capture of the photographic image by the image capture mechanism and a transmitter for transmitting the authorization signal generated by the controller towards a physical location at which the photographic image is captured. The authorization signal identifies a website URL at which information relating to the captured photographic image can be accessed to allow a person who has received the authorization signal to access the website and provide or deny an authorization for its use. | 06-10-2010 |
20100146602 | CONDITIONAL SUPPLEMENTAL PASSWORD - A password protected machine where a primary alternative password and a secondary alternative password are assigned, but the secondary alternative password cannot be used to gain access unless and until the primary alternative password has been deactivated. Also, a password protected machine where a user is assigned at least two alternative passwords, and where the use of one alternative password will automatically deactivate the other password. Preferably, there is a primary password and a secondary password such that: (i) the use of the primary password does not deactivate the secondary password, but (ii) the use of the secondary password does deactivate the primary password. | 06-10-2010 |
20100153451 | Multifactor authentication with changing unique values - A method of authentication includes the steps of providing a transaction service provider having a secure server; providing a user; requesting access authorization to the server of the service provider by the user, the server storing a set of use parameters obtained from the authorization access request, the use parameters including at least several prior location coordinates, methods of access, transaction information and access hardware used during the authentication to be used by the transaction service provider in subsequent requests by the user to access the server, the use parameters used in the authentication to be continually updated with the most recent data. | 06-17-2010 |
20100262509 | METHOD AND SYSTEM OF PRESERVING PURCHASED ON-DEMAND TRANSPORTATION ENTERTAINMENT SERVICES ACROSS DIFFERENT JOURNEY SEGMENTS OR SEPARATE TRIPS - A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight. | 10-14-2010 |
20110099168 | Providing Increased Quality of Content to a User Over Time - A method for increasing quality of content provided to a user. Communities of practice a user is associated with are determined based on login data. A corresponding set of tags is retrieved for each of the communities of practice. All corresponding sets of tags are aggregated to define a role for the user. A personal set of tags associated with the user is retrieved. The personal set of tags is added to the aggregate of all corresponding sets of tags to create a new set of tags. A context of the user in the particular task is recorded. The new set of tags is filtered based on the context to create a sub-set of tags. A defined number of tag aware information sources are queried using the sub-set of tags. Content is received from the defined number of tag aware information sources based on the query. The content is outputted. | 04-28-2011 |
20110153610 | TEMPORAL SCOPE TRANSLATION OF META-MODELS USING SEMANTIC WEB TECHNOLOGIES - Implementation of a meta-model service of a service oriented architecture industry model repository into a web ontology language representation of at least one topic map meta-model into a plurality of temporal scope topic map meta-models representing states of the at least one topic map meta-model at different times. The implementation includes assigning topics, occurrences, and attributes from the meta-model service to the at least one topic map meta-model. The topics, occurrences, and attributes are assigned from the at least one topic map meta-model to plurality of temporal scope topic map meta-models. The topics, occurrences, and attributes from the plurality of temporal scope topic map meta-models are converted into resource description framework triples; and the resource description framework triples are persisted into the resource description framework repository. | 06-23-2011 |
20110213840 | ROLE-BASED TAG MANAGEMENT FOR COLLABORATIVE SERVICES INTEGRATED WITHIN A SERVICE ORIENTED ARCHITECTURE - A tag management system for a user of a client-side portal application providing access to a set of services that include provisions for collaborative tagging of content comprises one or more data repositories configured to maintain one or more separate sets of tags, a messaging intermediary configured to provide access to the one or more data repositories and to provide for communication with the set of services, and a client-side agent configured to communicate with the set of services and access the one or more data repositories through the message intermediary to act on instructions provided by the user in one or more user roles. A set of tags corresponds to each service in each user role and specifies an available vocabulary for tagging content at that service. The agent is configured to access the one or more data repositories to load a first set of tags corresponding a user-specified service and a user-specified role, display the first set of tags to the user, and to communicate with the user-specified service to post tags selected by the user from the first set of tags to content at the user-specified service. | 09-01-2011 |
20120191490 | METHOD AND SYSTEM OF PRESERVING PURCHASED ON-DEMAND TRANSPORTATION ENTERTAINMENT SERVICES ACROSS DIFFERENT JOURNEY SEGMENTS OR SEPARATE TRIPS - A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight. | 07-26-2012 |
20120197747 | METHOD AND SYSTEM OF PRESERVING PURCHASED ON-DEMAND TRANSPORTATION ENTERTAINMENT SERVICES ACROSS DIFFERENT JOURNEY SEGMENTS OR SEPARATE TRIPS - A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight. | 08-02-2012 |
20120207316 | Operation of a Noise Cancellation Device - A method for improving the performance of a noise cancellation device, the method includes determining whether one or more noise making objects (NMO) are near an audible range of the noise cancellation device and receiving a signal from the one or more NMOs indicative of a kind of noise the one or more NMOs is generating. The method also includes selecting a specific noise cancellation model to reduce an expected noise in response to the received kind of noise the one or more NMOs is generating. | 08-16-2012 |
20130254794 | SIMULATION METHOD AND SYSTEM - A simulation method and system. A computing system receives a first audio and/or video data stream. The first audio and/or video data stream includes data associated with a first person. The computing system monitors the first audio and/or video data stream. The computing system identifies emotional attributes comprised by the first audio and/or video data stream. The computing system generates a second audio and/or video data stream associated with the first audio and/or video data stream. The second audio and/or video data stream includes the data without the emotional attributes. The computing system stores the second audio and/or video data stream. | 09-26-2013 |
20130305193 | GUI POINTER AUTOMATIC POSITION VECTORING - A method and computer system for rapid and accurate automatic vectoring of a graphical user interface pointer to a selectable item on a display. Based upon pointer movement input from a pointing device (e.g., a mouse, touchpad or specially configured keyboard), a direction of travel vector from an initial anchor position towards a target item is determined. The location of the target item is extrapolated and the pointer is automatically moved to that target item. To ensure that the pointer moves to the intended target item, the location of the target item is extrapolated based upon the direction of travel vector and default and/or user defined parameters. Optional user defined parameters include initial pointer anchor position, vector sensitivity, automatic selection of target item, and user defined pointer limitations. | 11-14-2013 |
20130312077 | USER AUTHENTICATION - A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing system enables a security manager software application and connects the specified software application to a computing apparatus. The computing system executes first security functions associated with the computing apparatus. The computing system executes second security functions associated with additional computing apparatuses. The computing system determines if the user may access the specified functions executed by the specified software application based on results of executing the first security functions and the second security functions. The computing system generates and stores a report indicating the results. | 11-21-2013 |
20130325333 | Sharing GPS Navigation Information - A host application on a host computer system receives annotations made by drivers of respective navigation information displayed to the drivers by GPS devices in vehicles of the respective drivers. The host application saves the annotated navigation information for the respective drivers on a computer readable memory accessible by the host application. The host application receives a request from a first one of the drivers for annotated navigation information made by one or more of the other drivers. Responsive to the request, the host application selects one or more items of the saved annotated navigation information. The host application sends the selected one or more items of the saved annotated navigation information to the GPS device of the first one of the drivers. | 12-05-2013 |
20140029811 | USER-AUTHENTICATING, DIGITAL DATA RECORDING PEN - A user-authenticating, digital data recording pen is provided. User-authenticating includes: using the digital data recording pen to write out by a user a handwritten password, which includes a handwritten character string to be authenticated; digitally comparing by the digital data recording pen the handwritten password to at least one handwritten password pre-stored for the user in the digital data recording pen; authenticating by the digital data recording pen the user if the handwritten password is within a defined tolerance of the pre-stored handwritten password; and if authenticated, associating by the digital data recording pen an indication of user authentication with data, such as a writing, of the user produced using the digital data recording pen. In one embodiment, the writing could be any alpha-numerical character string of the user interacting with a system via the digital data recording pen. | 01-30-2014 |
20140129473 | METHOD FOR REPORTING AND RELATING FIREARM DISCHARGE DATA TO A CRIME REPORTING DATABASE - A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm. | 05-08-2014 |
20140325591 | RULES DRIVEN MULTIPLE PASSWORDS - A rules driven multiple passwords system is provided wherein a list of stored passwords are used in rotation over time in accordance with a set of rules or conditions managed by the system. With such an arrangement, the currently active password of a system User may automatically be changed, in accordance with the rules or conditions, to the next password in the list. The User is notified as to the newly assigned password. | 10-30-2014 |