Patent application number | Description | Published |
20090045911 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 02-19-2009 |
20090052671 | SYSTEM AND METHOD FOR CONTENT PROTECTION - The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit. | 02-26-2009 |
20090052672 | SYSTEM AND METHOD FOR PROTECTION OF CONTENT STORED IN A STORAGE DEVICE - The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with an identifier and with a media Key block MKB. The media center includes: a unique identifier identifying the media center MC_UID, a set of device keys DK; storage means for storing files identified by respective file identifiers; and a processing unit comprising file encryption means for encrypting each file before storage in the storage means, using a title key (Kt) computed from the identifier MC_UID of the media center and for encrypting the title key Kt from the set of device keys DK of the media center, and from the identifier and the media key block MKB of the mobile secure and protection keyring, the media center being further provided to write the encrypted title key (eKt) in association with the file identifier of the file to the mobile secure and protection keyring. | 02-26-2009 |
20090060458 | METHOD FOR SYNCHRONIZING DATA FLOWS - The first data flow is buffered at a receiver, and the buffer contents are scanned for metadata. Where metadata are found indicating a second data flow which has not yet arrived, the system enters a stalling phase during which the length of any silent periods in the first data flow are stretched. As the point in the first data flow at which the second data flow is necessary gets closer, the factor by which silent periods are stretched increases exponentially. Once the expected second data flow in fact arrives, playback of two data flows is accelerated by compressing silent periods so as to clear the backlog of additional data that built up in the buffer during the stalling phase. | 03-05-2009 |
20090073912 | METHOD AND SYSTEM FOR DIGITAL COMMUNICATION THROUGH INFRASTRUCTURE NETWORK WITH RECEIVING STATIONS ACCORDING TO THEIR GEOGRAPHICAL STATUS - The present invention relates to a method and system of computer communication through an infrastructure multicast IP network, between one or several determined central stations and undetermined groups of receiving stations, especially mobile stations. According to the invention, every mobile station sends its geographical status, e.g. its position, in an IP unicast message to the central station. In response, the mobile station receives an IP unicast message comprising one or more IP multicast addresses corresponding to the transmitted geographical status. The central station also has the necessary routers subscribed or unsubscribed to these multicast addresses, according to the local presence of such receiving stations. Receiving stations may then subscribe such localized multicast addresses, and receive the corresponding multicast messages. | 03-19-2009 |
20090113512 | METHOD AND SYSTEM FOR PRESENTING A CONTINUOUS PROGRAMMING SEQUENCE AT A CLIENT TERMINAL - A method and system of presenting a continuous programming sequence at a client terminal, e.g., a set top box. A method in accordance with an embodiment includes: defining a programming sequence at a server; and the server instructing the client terminal associated with the programming sequence to retrieve a first program item specified in the programming sequence from a specified location. | 04-30-2009 |
20090121018 | VOTING METHOD - A voting method. A ballot paper is received. The received ballot paper includes a recorded vote. The recorded vote includes candidate/party information for an election held on a voting day in a jurisdiction. The ballot paper includes a burnable radio frequency identification (RFID) tag including an on-tag fuse that is not blown. The recorded vote is not revealable while the fuse is not blown and is revealable in response to the fuse being subsequently blown. After the ballot paper is received, the ballot paper is authenticated and the fuse is blown to reveal the recorded vote, followed by counting the ballot paper and directing the ballot paper to a candidate box. | 05-14-2009 |
20090121019 | VOTING SYSTEM AND BALLOT PAPER - A ballot paper and a voting system. The paper ballot is initially a voted ballot paper including: a recorded vote including candidate/party information for an election on a voting day in a jurisdiction, a burnable radio frequency identification (RFID) tag including a fuse not blown, and a basic RFID tag storing the jurisdiction's signature. The recorded vote is not revealable while the fuse is not blown and is revealable responsive to the fuse being blown. The voting system includes a ballot box and a ballot counting machine. The ballot box is configured to receive and authenticate the voted ballot paper and to generate a verified ballot paper. The ballot counting machine is configured to receive and authenticate the verified ballot paper, to effectuate a blowing of the fuse to reveal the recorded vote and to subsequently count the ballot paper and direct the ballot paper to a candidate box. | 05-14-2009 |
20090121840 | METHOD AND APPARATUS FOR LOCATING TIRES USING RFID - A method and apparatus for determining the position of four tires on corresponding four wheels in a vehicle. Each wheel has an axis of rotation. Each tire has an embedded Radio Frequency IDentification (RFID) tag. The RFID tags embedded in the four tires have respective identifiers denoted as ID | 05-14-2009 |
20090121843 | METHOD AND SYSTEMS FOR LOCALIZING OBJECTS USING PASSIVE RFID TAGs - Method and system for localizing an object in a stack of objects. A passive radio frequency identification (RFID) tag is attached to each object. Each RFID tag includes a unique identifier of the object to which the RFID tag is attached. A RFID reader has multiple antennas. Each antenna is positioned to transmit a signal that can be detected by different RFID tags attached to the objects within a reading range of the transmitted signal from each antenna. The antennas are sequentially selected and powered to transmit to the stack a read signal including object's identifier for the object to be localized. If a response to the read signal is received by a selected and powered antenna from a RFID tag that matched the object's identifier with its unique identifier, then a light emitting diode (LED) is lighted to identify a location of the object being localized. | 05-14-2009 |
20090125624 | SYSTEM FOR BILLING NETWORK ACCESS CAPACITIES SHARED BETWEEN INTERNET SERVICE PROVIDERS - For optimizing Internet access resources, a system for billing network access capacities shared across Internet service providers is disclosed. A Client Service Provider (CSP) may rent access on Points Of Presence belonging to a Master Service Provider (MSP) while maintaining a constant security level and providing connection accounting. When a CSP's subscriber sends an access request to a MSP, the MSP analyzes the subscriber's realm and checks the capacities allocated to the subscriber's CSP. If connection is allowed, the MSP sends an authentication request to the CSP. If the subscriber is authenticated, the MSP launches an accounting process based on the subscriber's realm while the CSP may launch an accounting process associated with the subscriber identifier. The cost of rented Points Of Presence capacity is based on total connection time and on the number of simultaneous connections established by the MSP for the CSP, combined with predetermined thresholds. | 05-14-2009 |
20090135898 | METHOD AND USER DEVICE FOR RECEIVING DIGITAL TRANSMISSIONS - The invention provides a user device ( | 05-28-2009 |
20090138776 | RETRANSMISSION MANAGER AND METHOD OF MANAGING RETRANSMISSION - The invention provides a retransmission manager for use in a digital content delivery system, wherein the delivery system comprises a plurality of user devices, a set of content providers for delivering digital content to the user devices in the form of bursts of content through a source unit. The retransmission manager is connected to the user devices to receive notifications therefrom, each notification received from a given user device identifying a burst received by the given user device which is candidate for retransmission. The retransmission manager selects a set of bursts among the bursts identified by the notifications based on the amount of available bandwidth at the source unit and on negotiation messages received from at least one of the plurality of content providers, the negotiation message being related to at least one burst identified in the notifications and including, for each burst, a negotiation parameter. The retransmission manager then sends a request for retransmission of the selected bursts to the source unit. | 05-28-2009 |
20090138932 | QUALITY MANAGER AND METHOD FOR USE IN A DIGITAL CONTENT DELIVERY SYSTEM - The invention provides a quality manager for use in a digital content delivery system. The digital content delivery system comprises a plurality of user devices, a source unit connected through a communication network to the user devices for delivering digital content to the user devices in the form of bursts of content. The quality manager is connected to the user devices and adapted to receive notifications therefrom, each notification received from a given user device identifying a burst received by the given user device and including a quality indicator related to the quality of the received burst. The quality manager is further adapted to select a set of bursts among the bursts identified by the notifications, based on predefined rules comprising a rule related to the quality indicator included in the notifications, and for sending a request for retransmission of the selected bursts to the source unit. | 05-28-2009 |
20090157772 | SYSTEM FOR EXTENDING THE FILE SYSTEM API - A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files. | 06-18-2009 |
20090158090 | DATA ENTRY RETRIEVAL - The present invention provides for the recovery of characters entered into at least one data entry zone of a data entry window. A method in accordance with an embodiment includes: storing a first image of the data entry window during data entry; subtracting a reference image from the first image to obtain a delta image, wherein the reference image is an image of the data entry window without data entered; identifying at least one non empty zone of the delta image and the location of the at least one data entry zone on the data entry window from the location of the at least one non empty zone on the delta image; extracting at least one character by applying optical character recognition to the least one non empty zone; and inputting the at least one character into the location of the at least one data entry zone. | 06-18-2009 |
20090158140 | METHOD AND SYSTEM TO SECURE THE DISPLAY OF ADVERTISEMENTS ON WEB BROWSERS - A method and system to secure the display of advertisements on web browsers. A method according to an embodiment includes: interpreting a markup file in a virtual machine, converting displayable elements of the markup file to one or a plurality of images and constructing a modified markup file comprising the at least one image file and a scripting language code adapted to cause a user terminal upon which it is executed to transmit coordinate information defining the position of a user-controlled cursor and action information defining a clicking action. | 06-18-2009 |
20090158141 | METHOD AND SYSTEM TO SECURE THE DISPLAY OF A PARTICULAR ELEMENT OF A MARKUP FILE - A method and system to secure the display of a particular element of a markup file, interpreting a markup file comprising displayable elements, converting the displayable elements of the markup file to at least one image and constructing a modified markup file including the at least one image and a scripting language code adapted to encode links and input fields associated to the image. | 06-18-2009 |
20090160603 | LOCATING RFID TAGS - A method and RFID tag for locating RFID tags. A passive RFID tag A receives a polling command transmitted from a RFID reader and addressed to another passive RFID tag B. The RFID tag A determines that the polling command is not addressed to the RFID tag A and consequently, at time t | 06-25-2009 |
20090160622 | DIVIDING TAGGED ITEMS INTO SUBSETS - A method and system for dividing a set of tagged items into subsets. Each tagged item is tagged with a passive RFID tag. A RFID reader is instructed to poll the RFID tags of all tagged items in a specified region having fixed boundaries to generate information including, for each tagged item, a spatial location of each tagged item and a list of all other tagged items in the region which are adjacent to each tagged item. The region is split into a plurality of subregions. For each subregion, a central tagged item having more adjacent tagged items in each subregion than any other tagged item in each subregion is determined, utilizing the generated information. A virtual boundary is outlined around the central tagged item to enclose the central tagged item and a portion of the tagged items in each subregion which are adjacent to the central tagged item. | 06-25-2009 |
20090165044 | METHOD AND SYSTEM FOR SELECTING A PROGRAM ITEM - A method of selecting a program item by defining a programming template relating to a predetermined period for an individual viewer. The programming template includes a plurality of sequential time slots, each time slot being associated with a particular content type selected from a standard program content classification structure. For a given time falling within a respective the time slot, a program item is selected from a plurality of candidate program items. This program item identified as having content of the type associated with the one of the time slots. Thus an EPG is automatically compiled on the basis of a user profile which calls for a certain type of content (film/news/weather/clips etc.) at certain times of the day or week. | 06-25-2009 |
20090169019 | METHOD AND SYSTEMS USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object. | 07-02-2009 |
20090189457 | METHOD AND SYSTEM FOR READING A TRANSPONDER - A transponder, a method for powering the transponder, and a system relating to the method. The transponder includes at least two electrical coils, a dipole antenna, and a chip electrically connected to the dipole antenna and the electrical coils, wherein the electrical coils surround the dipole antenna and the chip. The transponder is surrounded with a wiring loop. An alternating current is generated in the wiring loop. The alternating current generates a magnetic field at the electrical coils. The electrical coils receive energy from the magnetic field and transfer the received energy to the chip for powering the transponder. The dipole antenna is configured to transmit an output signal to a reader and to receive an input signal from the reader. | 07-30-2009 |
20090200867 | SYSTEM AND METHODS FOR SCHEDULING POWER USAGE - A system for scheduling electric power consumption cycles is provided. A consumption cycle is a time period of human scale, minutes or hours typically, rather than an electrical cycle. The system includes an electric-powered device driven by power supplied by an electric power network. The system also includes a consumption cycle data (CCD) requesting module communicatively linked to the electric-powered device. The link may use electric power lines via methods such as Broadband over Power Line, or may be wireless. The CCD requesting module is configured to generate a CCD request requesting allocation of electric power from the electric power network. Additionally, the system includes an electric power network node electrically connected to the electric-powered device from which electric power is conveyed to the electric-powered device. The system also includes a CCD responding module communicatively linked to the CCD requesting module. The CCD responding module is configured to determine whether the request for allocation of power can be granted subject to a predetermined capacity constraint. | 08-13-2009 |
20090201154 | APPARATUS FOR SECURING A LAND SURVEYOR'S MARK BASED ON THE USE OF A RADIO FREQUENCY IDENTIFIER TAG - A surveyor's mark and a method for forming the mark. The mark includes a stick and a head assembled to the stick. The stick is configured to be planted in a ground and the head is configured to be above the ground. The head includes a tag having an identification number. The identification number has a value which is a first code value. The stick includes a tinny wire configured as an electrical conducting loop and connected to the tag. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in the head being disassembled from the stick and the tinny wire breaking so as to open the loop which changes the value of the identification number from the first code value to a second code value. | 08-13-2009 |
20090205405 | MONITORING OF WEARING SURFACE LAYER THICKNESS - A method of wear level determination and an associated product. Multiple Radio Frequency IDentification (RFID) tags are distributed within a thickness of a wearing surface layer of a tire. The multiple RFID tags include first RFID tags that have not been worn away, second RFID tags that have been worn away, and a special RFID tag that has not been worn away. A measure of wear of the wearing surface layer of the tire is determined from data received from the first RFID tags and from a table in the special RFID tag. The product includes the wearing surface layer of the tire, the multiple RFID tags, and a mechanism for determining the measure of wear of the wearing surface layer. | 08-20-2009 |
20090217176 | METHOD AND SYSTEM FOR MANAGING EVENTS IN AN ELECTRONIC CALENDAR APPLICATION - The present invention relates to a method for managing meeting conflicts using user defined priority within a electronic calendar application, and providing history of meeting invitations. When a new meeting is being scheduled, if a conflict exists, the user may set a priority to the meeting. On reschedule or suppress meeting, a priority of overlapped meetings are automatically updated and acceptance is generated for meeting becoming in higher priority. A GUI allows user to modify priority of meetings at any time (accept and “decline with keep me informed” are automatically generated according to new priority). | 08-27-2009 |
20090282464 | SYSTEM AND METHOD FOR AUTHENTICATING AN END USER - A system and associated method for authenticating an end user. The method comprises generating a first mask in response to an authentication request from an end user, the first mask comprising a set of root nodes, a set of server nodes, and a set of client nodes each being unique to the end user. Next, determining the authenticity of the end user based on comparing data received from the end user with nodes contained in the first mask. The data comprising a set of nodes selected by the end user and the end user having selected the data in response to the first mask. | 11-12-2009 |
20090292984 | METHOD AND SYSTEM TO SELECTIVELY SECURE THE DISPLAY OF ADVERTISEMENTS ON WEB BROWSERS - A method and system to selectively secure the display of advertisements on web browsers. A method in accordance with an embodiment includes: defining a particular displayed area of the interpreted markup file; obtaining the DOM tree of the interpreted markup file, the DOM tree comprising parent and child nodes, each node being associated with displayable elements; identifying in the DOM tree a set of child nodes whose displayable elements comprise the particular displayed area; identifying in the DOM tree a first parent node comprising the set of child nodes; converting displayable elements associated with the identified first parent node to an image; generating a second parent node comprising the image; and modifying the DOM tree into a modified DOM tree by deleting the identified set of child nodes and by replacing the identified first parent node by the second parent node. | 11-26-2009 |
20090315679 | LOCATION LOCALIZATION METHOD AND SYSTEM - A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from a first group of active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the first group of active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag of the first group and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the first group of active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user. | 12-24-2009 |
20090315685 | METHODS AND SYSTEMS FOR RFID TAG GEOGRAPHICAL LOCATION USING BEACON TAGS AND LISTENING TAGS - RFID method and system are provided. A reader transmits a reader signal to beacon tags and a listening tag. The beacon tags transmit beacon signals including a beacon identification and a beacon distance to the reader. The listening tag receives the beacon signals. Neighbor distances are calculated for the beacon tags based on when the beacon signals are received, when the listening tag receives the reader signal, and a constant processing time. The neighbor distances are the individual distances from the listening tag to the beacon tags. A list is stored including the beacon identification for the beacon tags, the beacon distance, and the neighbor distances. The listening tag transmits the list and a listening tag identification to the reader. A geographical position of the listening tag is calculated based on the beacon distance, beacon coordinates, and a listening tag distance which is from the reader to the listening tag. | 12-24-2009 |
20100004816 | SYSTEM AND METHOD FOR GATHERING AND SUBMITTING DATA TO A THIRD PARTY IN RESPONSE TO A VEHICLE BEING INVOLVED IN AN ACCIDENT - A system and associated method for gathering and submitting data to a third party in response to a vehicle being involved in an accident. First an information manager stores data regardless of the vehicle being involved in an accident. Next the event detection manager stores data in response to detecting the vehicle being involved in an accident. Next the information manager stores state data pertaining to the vehicle's current state. Then an adjacent identifier manager requests, receives, and stores data from surrounding vehicles in memory. Next a report is generated and encrypted. Finally, the encryption and transmission manager stores the report in memory. | 01-07-2010 |
20100023586 | SYSTEM AND METHOD FOR CORRELATING QUESTIONS AND ANSWERS IN AN INSTANT MESSAGING ENVIRONMENT - A system and method for correlating questions and answers in an instant messaging environment. First creating an instant messaging client at least two zones, each zone of the at least two zones corresponding to a unique end user, each zone of further comprising at least one textbox. After creating the instant messaging client, providing the instant messaging client to each end user of at least two end users. Receiving a message from an end user, the message comprising a first value and a second value and text. Finally, sending the text received in the message to each instant messaging client not being controlled by the sending end user, the text therein being displayed in a textbox having the second value and being located in a zone corresponding to the sending end user. | 01-28-2010 |
20100042945 | APPLICATION WINDOW AREA CHANGE SURVEILLANCE - A method and system for monitoring a computer program window define an area of a computer program window and compute a hash value for the defined area. The computed hash value is stored and the hash value is recomputed for the defined area after a predetermined time period. The recomputed hash value is compared with the stored. If the stored hash value and the recomputed hash value are different, the method and system overwrite the stored hash value with the recomputed hash value, and generate a notification. Recomputing, comparing, overwriting and generating are performed periodically to monitor the changes in the defined area. | 02-18-2010 |
20100057866 | DELIVERING AND REPLYING TO EMAIL USING HIDDEN ADDRESS - A method for use when an original email is sent from an originator to a receiver, having a real email address, at a destination email address, which includes a concatenation of an alias and a magic number, is provided and includes replacing the destination email address with the real email address of the receiver, adding a new header field to the original email indicating that the destination email address was an original destination of the original email and forwarding the original email to the receiver at the real email address. If the receiver replies with a reply email, the method further includes setting a from header field in the reply email with a new header field indicating that the destination email address was an original destination of the original email, and if the original email is appended, removing the new header field from the original email. | 03-04-2010 |
20100066513 | VEHICLE AUTHORIZATION METHOD AND SYSTEM - A vehicle authorization method and system. The method includes transmitting, by a computing system in a vehicle, a first request for enabling the vehicle for a driver. The computing system receives vehicle identification data associated with the vehicle. The computing system identifies the driver. The computing system transmits a second request for information associated with the driver. The computing system receives driver's license data associated with the driver, a list comprising authorized drivers for the vehicle, and insurance data associated with the driver and the vehicle. The computing system analyzes the vehicle identification data, the driver's license data, the list, and the insurance data. The computing system performs specified functions associated with the vehicle. The computing system generates and stores a report indicating the specified functions. | 03-18-2010 |
20100070622 | SYSTEM AND METHOD FOR UTILIZING SYSTEM LAG TO SEND FACTS TO AN END USER - A method for utilizing system lag to send facts to an end user. The method begins by monitoring a computer system to identify said system lag. After identifying system lag, the method determines an estimated length of the system lag, the estimated length being a measurement of time. The estimated length takes into account previously identified system lag lengths to better approximate the current system lag length. After determining the estimated length of the system lag, the method sends a fact to the end user during the system lag. The fact sent to the end user has a length equal to or less than the estimated length of the system lag. Finally, the method stores the actual length of the system lag in order to improve subsequent determinations of the estimated length. | 03-18-2010 |
20100074420 | PHONE CALL MANAGEMENT - A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated. | 03-25-2010 |
20100077039 | METHOD AND SYSTEM FOR PLAYING VIDEO ON A MOBILE DEVICE - The invention provides a system and a method for automatically switching from a local storage to a remote storage for recording a broadcast video stream, the switching being triggered by the fact that the local storage is almost full, and for automatically switching from a local storage to a remote storage for playing a broadcast video stream in a delayed manner, the switching being triggered by the fact that the video frames in the local storage are exhausted. | 03-25-2010 |
20100087214 | ASYNCHRONOUS URL NOTIFICATION - A method for sending a URL from a computing device to a recipient's mobile device, the method includes: generating a URL notification during an Internet session on a computing device; sending the URL notification to an Asynchronous URL Notification daemon; composing a Control SMS that comprises the URL; locating compatible communication devices; wherein the locating is performed with the daemon interacting with a local Bluetooth stack to identify the communication devices; wherein the communication devices are Bluetooth enabled devices that support an Asynchronous URL Notification profile; generating a list of communication devices; receiving the user's selection of a communication device; pairing the selected communication device with the computing device; retrieving an address book from the selected communication device; and displaying a list of recipients from the address book; sending the Control SMS to a recipient's mobile device in response to the user selection from the list of recipients. | 04-08-2010 |
20100097174 | Providing Parcel Procurement With Acknowledgement Of Receipt In An Intelligent Mailbox - A method for providing a procuration to a user on behalf of a letter or parcel recipient for authorizing this user to retrieve this letter or parcel with acknowledgement of receipt in an intelligent mailbox. Exemplary embodiments include a method to forward delegation between the original recipient and the delegated user through an exchange supported by any electronic or physical protocol of a delegation information made of the recipient unique identifier, a validity period and a hashcode, signed with the recipient private key and the mailbox public key. | 04-22-2010 |
20100097184 | METHOD AND APPARATUS FOR READING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag; interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs. | 04-22-2010 |
20100097185 | RFID TAG POSITIONAL ADDRESSING - The present invention is directed to a method and apparatus for radio frequency identification (RFID) tag positional addressing. A method in accordance with an embodiment of the present invention includes: activating a plurality of first RFID tags, wherein each first RFID tag emits an identification (ID) and a position; capturing the IDs and positions emitted by the first RFID tags using a plurality of second RFID tags, wherein each second RFID tag captures the IDs and positions emitted by the first RFID tags located in a vicinity of the second RFID tag, and wherein each second RFID tag determines its physical location based on the captured IDs and positions; and sending a read command including a position of a targeted one of the second RFID tags that is to be read, wherein only the targeted second RFID tag located at the position in the read command responds to the read command. | 04-22-2010 |
20100097196 | METHOD AND APPARATUS FOR VISUALLY LOCATING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for visually locating short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in the container, wherein each second RFID tag is coupled to a respective illumination source; addressing one of the first RFID tags; and activating the illumination source coupled to each second RFID tag that captured the ID of the addressed first RFID tag. | 04-22-2010 |
20100097222 | Insuring personal mail delivery with automatic acknowledgement - An intelligent mailbox and a method for authorizing a user to pickup a parcel with acknowledgement of receipt in a mailbox. Exemplary embodiments include a method to insure personal mail delivery in a mailbox, the method including determining a first biometric data as required by an RFID tag enclosed in a parcel having been previously introduced in the mailbox, determining an insertion of a second key including a second biometric data into a biometric reader, determining if the second biometric data is granted a procurement to pickup the parcel, opening a biometric lock if the second user is granted a procurement, opening a traditional lock if the biometric lock has been opened, displaying one of an indication to a user of the presence of the parcel and an indication to a postman and recording a pickup of the parcel. | 04-22-2010 |
20100099398 | CALL MANAGEMENT SYSTEM - A system, method and program product for managing inbound calls on a mobile device. A system is provided that includes: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information. | 04-22-2010 |
20100106417 | SYSTEM AND METHOD FOR IDENTIFYING A TRAJECTORY FOR EACH VEHICLE INVOLVED IN AN ACCIDENT - A method for identifying a trajectory for each vehicle involved in an accident. The method begins by plotting on a Cartesian Coordinate Plane GNSS locations corresponding to a vehicle involved in the accident. Next, the method identifies GNSS locations on the Cartesian Coordinate Plane where the vehicle was speeding. Next, the method marks those GNSS locations on the Cartesian Coordinate Plane where the vehicle involved in the accident was skidding. The process of plotting and identifying speeding as well as skidding is repeated for all vehicles involved in the accident. The Cartesian Coordinate plane then having all vehicle trajectories residing therein is sent to an output device. | 04-29-2010 |
20100109852 | EXPIRATION MANAGEMENT METHOD AND SYSTEM - An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results. | 05-06-2010 |
20100111085 | METHOD AND SYSTEM FOR PERSONALIZING A MULTIMEDIA PROGRAM BROADCASTED THROUGH IP NETWORK - A method and a system. A Medium Access Control (MAC) frame includes an embedded Internet Protocol (IP) frame and a MAC address. The IP frame includes content of a second multimedia program and a second multicast address of the second multimedia program, the MAC address having been resolved from the second multicast address. The second multicast address is determined to be linked to a first multicast address of a first multimedia program of a television channel being played at a user host. The IP frame is forwarded from the MAC frame to an IP layer where the second multicast address is ascertained to be a multicast sub group address of the first multimedia program and is replaced in the IP frame with the first multicast address, after which the IP frame is transmitted to the user host to replace or be inserted into the first multimedia program being played. | 05-06-2010 |
20100117797 | CLOSURE WITH PASSIVE ELECTRONIC SENSOR FOR TAMPER DETECTION AND RELATED METHOD - A closure includes a closing member for sealing an opening of a pressurized container. The closing member may include a passive electronic sensor coupled thereto that includes a status register that may be readable by, for example, a RFID reader. The status register is responsive to a pressure change in the pressurized container caused by an insertion of the closing member into the opening or an extraction of the closing member from the opening. The status value in the status register indicates whether the pressurized container has been tampered with. An identification register may include a pressurized container identification encrypted with the private key of the manufacturer, which can be decrypted for comparing to identification on the pressurized container to identify tampering. | 05-13-2010 |
20100123580 | TAMPER DETECTION, MEMORIZATION, AND INDICATION FOR PACKAGING - The present invention is directed to tamper detection, memorization, and indication for packaging. A method in accordance with an embodiment of the present invention includes: detecting when the package is opened and closed; and generating an alarm if the package is opened more than once after it is initially closed to indicate that the package has been tampered with. | 05-20-2010 |
20100131478 | SYSTEM AND METHOD FOR LOADING A CALLED CLASS FILE TABLE WITH DATA INDICATING A HIGHEST VERSION OF A CLASS FILE - A system and a method for loading a called class file table with data indicating a highest version of a class file of a software application are provided. The method includes retrieving a first class version dependency file associated with a first class file, having both a first class name and a first version number associated with a second class file that is called by the first class file. The method further includes adding a first record to the called class file table having both the first class name and the first version number associated with a second class file, and retrieving a second class version dependency file associated with a third class file. The second class version dependency file has both a second class name and a second version number associated with a fourth class file called by the third class file. The method further includes if the second class name is identical to the first class name in the called class file table and the second version number is higher than the first version number, then updating the first record in the called class file table with the second class name and the second version number. | 05-27-2010 |
20100135331 | SYSTEM AND METHOD FOR SYNCHRONIZING COMMUNICATING ENTITIES IN A DECENTRALIZED NETWORK - A method for synchronizing communicating entities in a decentralized network. The method begins with a recipient entity receiving data comprising a first timestamp and a first distance. The first timestamp being the time the first data was broadcast; the first distance being a distance from the sender's synchronization time. Next the recipient entity receives data comprising a second timestamp and a second distance. The second timestamp being the time the second data was broadcast; the second distance being a distance from the sender's synchronization time. Based on the first and second timestamps and distances, the recipient entity calculates a new synchronization time. Next, the recipient entity broadcasts to at least one entity in the decentralized network data comprising a third timestamp and a third distance. The third timestamp being the time the third data was broadcast; the third distance being a distance from the recipient entity's synchronization time. | 06-03-2010 |
20100138657 | System and method for authenticating an end user - A method for authenticating an end user. The method starts by generating a first pattern in response to receiving an authentication request from the end user. Next, the method continues by generating a second pattern in response to receiving confirmation that the end user received the first pattern; the second pattern comprising multiple colored nodes. Then the method determines the authenticity status of the end user by comparing data sent by the end user with the second pattern. The end user having generated the data by overlaying a transparent credit card on top of the second pattern and selecting at least one node which displays a color other than black. Finally, the method sends the determined authenticity status to the end user via an output device. | 06-03-2010 |
20100138912 | System and method for authenticating an end user - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 06-03-2010 |
20100150353 | SECURE METHOD AND APPARATUS TO VERIFY PERSONAL IDENTITY OVER A NETWORK - The present application provides an apparatus and method for verifying a user, via captured biometric characteristics of the user, who is interacting online. The captured biometrics are guaranteed to be captured in real-time, and avoids the possibility of providing biometrics that were previously captured, by sending to the user a time-sensitive challenge and requiring the user to provide the requested biometric information within a predetermined time period. Therefore, the present invention is best positioned for environments where trusted identification of a user is needed online to facilitate secure transactions. | 06-17-2010 |
20100151840 | GENERATING ALERTS BASED ON PREDICTED WIRELESS CONNECTION LOSSES - A method and system for generating alerts based on predicted wireless connection losses. A message is received that includes a first position of a mobile device, an indication of a service being provided to the mobile device via a wireless connection provided by a first bearer, and an mobile device identifier. A direction and speed of the mobile device is received. An amount of time elapsing before the mobile device moves to a second position at which the mobile device experiences a loss of the wireless connection via the first bearer is predicted. An alert that indicates that the loss is occurring in the amount of time is generated. The alert is sent to the mobile device as a response to the message. | 06-17-2010 |
20100153001 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - A method and system for generating optimal itineraries based on network connectivity. A computer receives a first message from which a current position of a vehicle on a trip, destination, service(s) being provided to mobile device(s) in the vehicle, service provider(s) and network(s) are extracted. Optimal itineraries are generated by generating sets of optimal parameters that include paths for which connectivity measures satisfy predefined criteria and hops that indicate positions associated with connectivity changes. A response to the first message indicates the optimal itineraries and the associated sets of optimal parameters and is sent to a vehicle-based device. Sending the response results in the mobile device(s) making the connectivity changes when the vehicle is detected at the hops. | 06-17-2010 |
20100153722 | METHOD AND SYSTEM TO PROVE IDENTITY OF OWNER OF AN AVATAR IN VIRTUAL WORLD - The present application provides an method and system for verifying a user's identity within a virtual world environment. The verification is to be in real-time and avoids the possibility of providing credential (e.g., biometric information) that were previously authentication, by sending to the user a time-sensitive challenge and requiring the user to provide the requested credentials (e.g., biometric information) within a predetermined time period. Therefore, the present invention is best positioned for environments where trusted identification of a user is needed online to facilitate secure transactions. | 06-17-2010 |
20100161491 | VEHICLE FED ACCIDENT REPORT - A computer implemented method for rapidly and securely filing, via wireless means, a consolidated accident report. An additional aspect of the method encompasses a computer software product for performing the method described herein. In one embodiment of the invention, the opposing parties jointly fill out at least a part of a digital accident report form; i.e., each party fills out a different portion of the form. Each party has the opportunity to positively acknowledge or reject the information entered by their opposing party. The digital accident report form may be completed and filed with the rejection registered, although it is preferred that a mutually agreeable resolution be achieved. Once completed, each opposing party files the consolidated accident report with an appropriate interested third party, e.g., an insurance company, a law enforcement agency, or a hospital. | 06-24-2010 |
20100261463 | MOBILE ADDRESS BOOK POPULATION USING SMS POLLING - A system, method and program product that automatically populates address book fields. A system is described that includes: a system for sending and receiving SMS messages; an address book that includes an entry for an owner and entries for contacts associated with the owner, wherein each entry includes a set attributes and at least one piece of attribute data; a system for parsing an incoming SMS message to identify a request for attribute data of the owner and for generating a responsive SMS message with attribute data of the owner; and a system for issuing SMS messages to contacts in the address book requesting additional attribute data and for loading received attribute data into the address book. | 10-14-2010 |
20110112748 | SYSTEM AND METHOD FOR EXCHANGING POSITIONING INFORMATION BETWEEN VEHICLES IN ORDER TO ESTIMATE ROAD TRAFFIC - The present invention discloses a method, system and computer program embarked in a vehicle, for estimating traffic conditions based on positioning information exchanged with other vehicles using wireless communication. A method in accordance with an embodiment of the invention includes: receiving positioning information repeatedly broadcast by at least one vehicle, the positioning information for each vehicle including: information related to a current location of the vehicle; and information identifying the vehicle; calculating based on at least two successive locations of a same identified vehicle, a current speed and a current direction for the vehicle; and estimating current traffic conditions based on current location, speed and direction of identified vehicles. | 05-12-2011 |
20120059936 | MASTERLESS SLOT ALLOCATION - A masterless time slot allocation technique that collaboratively synchronizes, at a time slot level, devices communicating in an ad hoc network. Responsive to determining a current time slot allocated to a first device is occurring, the first device transmits a map to the other devices. The map includes an allocation of time slots to the devices, including indicators for whether each time slot is free, busy or overbooked, devices that own the time slots, and how recently information associated with each time slot was updated. After receiving the map, a second device determines a conflict in which the same time slot is allocated to the second device and to another device. The conflict is resolved by allocating another time slot to the second device and the result of resolving the conflict is each slot is allocated to no more than one device. | 03-08-2012 |
20120087582 | METHOD AND SYSTEM FOR RESIZING AN IMAGE - There is disclosed a method and system for resizing a digital image wherein a RGB image is converted into an YCbCr image (Y, Cb, Cr planes). Thereafter, a discrete cosine transform (DCT), followed by a specific inverse cosine transform (IDCT) is performed on each row/column of the Y, Cb, Cr planes. The mentioned specific operation corresponds to a type of homothetic matrix, which dimensions are defined by a scaling factor. In order to produce a scaled image, the scaled Y, Cb, Cr images are transformed to an RGB image for display. | 04-12-2012 |
20120185450 | METHOD AND SYSTEM TO HANDLE JAVA CLASS VERSIONING - There is disclosed a method of handling a given object class in an object-oriented environment, wherein it comprises, in response to the invocation of the given object class during runtime, the steps of: determining if the version associated with the given object class differs from a predefined minimal version and if so: (a) generating a new version of the object class from the previous version of the object class by invoking an interface method migrating an object class from a version to another; (b) extending the new object class by updating pointer links to the previous version of the given object class. The previous version of the object class may be maintained accessible after the object migration. | 07-19-2012 |
20120204229 | METHOD AND SYSTEM FOR AUTHENTICATING AN END USER - A method and associated system for authenticating an end user. A selected subset of root nodes of a set of root nodes in a server mask is received, the selected subset of root nodes having been selected by the end user. In response to the receiving of the selected subset of root nodes, the end user is authenticated by determining that the spatial location in the server mask of each root node of the selected subset of root nodes matches a spatial position of a corresponding root node of a server set of transparent root nodes in the server mask, wherein the server set of transparent root nodes are a result of a first random selection of root nodes from the set of root nodes in the server mask. | 08-09-2012 |
20120218088 | LOCATION LOCALIZATION - A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user. | 08-30-2012 |
20120242452 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 09-27-2012 |
20120324188 | VIRTUAL USB KEY FOR BLADE SERVER - A method for sharing data contained on a peripheral device amongst a pluratlity of blade servers is disclosed. The method includes storing a copy of data from a peripheral device to a memory device. The memory device is partitioned into at least ‘n’ memory areas, each memory area storing one copy of the data. The method also includes assigning one of the at least ‘n’ memory areas to each of a plurality ‘n’ of servers. The method also includes establishing communication between the plurality of servers and the plurality of assigned memory areas via a switch controller. The switch controller is configured to access the plurality of assigned memory areas via a processor. | 12-20-2012 |
20120326872 | SECURING A LAND SURVEYOR'S MARK BASED ON USE OF A RADIO FREQUENCY IDENTIFIER TAG - A surveyor's mark and a method of forming the mark. A tag is embedded in a head. The head is removably assembled to a stick. The head is configured to be above a ground when the stick is planted in the ground. The head includes a tag. The tag in the head includes an identification number whose value identifies the tag and indicates if the head is disassembled from the stick. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in changing the value of the identification number in the tag from a first code value to a second code value that differs from the first code value. | 12-27-2012 |
20130124086 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - An approach for generating optimal itineraries based on network connectivity is presented. A computer receives a first message from which a current position of a vehicle on a trip, destination, a service being requested for a mobile device in the vehicle, service providers and network(s) are extracted. Network connectivity measures are retrieved and signal qualities in respective cells are determined based on the network connectivity measures. Based on the signal qualities, an itinerary is determined as paths and a hop indicating a position on one of the paths at which a connectivity change from a first to a second service provider is to occur. A response to the first message indicates the itinerary. Sending the response results in the mobile device making the connectivity change when the vehicle reaches the position indicated by the hop. | 05-16-2013 |
20130124087 | GENERATING OPTIMAL ITINERARIES BASED ON NETWORK CONNECTIVITY - An approach for generating optimal itineraries is presented. As a response to a first message sent to a remote computer system by a global positioning device transported by a vehicle on a trip, the device receives a second message indicating optimal itineraries of the trip. The device receives a selection of an optimal itinerary indicating a path, a hop, an updated service provider to provide a service to a mobile device transported by the vehicle, and an updated network for providing the service. The device detects the vehicle at a position indicated by the hop, and in response, generates a third message indicating the updated service provider and the updated network. The global positioning device sends the third message to the mobile device and as a result, the mobile device makes a connectivity change to the updated service provider and/or to the updated network. | 05-16-2013 |
20130230166 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity about an object. The request includes a media identifier, a media key block, an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted using a random key. The encrypted step certificate and an encrypted random key are sent to the requester entity for subsequent writing the step certificate and the encrypted random key on a media. | 09-05-2013 |
20130230167 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first encrypted step certificate is extracted. A second hashing result is obtained from hashing the object to be authenticated. A third hashing result of an object identifier encoded within a decrypted second encrypted step certificate is extracted. A fourth hashing result is obtained from hashing the object to be authenticated. It is determining that the first hashing result is equal to the second hashing result and that the third hashing result is equal to the fourth hashing result, from which it is ascertained the object status of the object is that the object is an authentic object, a counterfeited object, or a stolen object. The ascertained object status is displayed on a screen of an authenticity verification equipment. | 09-05-2013 |
20130254863 | AUTHENTICATION OF AN END USER - A method and system for authenticating access of secure information by a user device. An authentication request for accessing the secure information is received, the authentication request including a user identifier of a user at the user device. A position of a secret quadrilateral within a first pattern of colored quadrilaterals is determined and is identifiable by the user identifier; the secret quadrilateral includes an authenticating color. The first pattern of colored quadrilaterals including the secret quadrilateral is generated. A second pattern including colored nodes that include the authenticating color at positions within a transparent authenticating card assigned to the user. The first pattern and the second pattern are sent to the user. Location information from the user device is received. It is determined that the subset of nodes that include the authenticating color, which allows access to the secure information by the user device. | 09-26-2013 |
20130262318 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 10-03-2013 |
20140040140 | AUTHENTICATION OF AN END USER - A method, system, and computer program product for authenticating an end user. A login field is generated and sent to an end user, and a set of nodes is subsequently received from the end user. The login field includes first colored nodes having multiple colors distributed in a first random pattern. A transparent credit card controlled by the end user includes second colored nodes having multiple colors distributed in a second random pattern. An authenticity status of the end user is determined, and then sent to the end user, by determining whether each node of the set of nodes (i) corresponds to a unique node of the first colored nodes and (ii) has a same color determined by a function of a static integer and a dynamic integer D, wherein S and D are known only to the end user and the provider of the transparent credit card. | 02-06-2014 |
20140330728 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 11-06-2014 |
20140380301 | LAUNCHING A TARGET APPLICATION BASED ON CHARACTERISTICS OF A STRING OF CHARACTERS IN A SOURCE APPLICATION - A method and system for launching a target application. A predefined data type is identified by: determining that a first row of a parser table including a first regular expression formulating a string of characters includes rows ordered from a more general to a more specific regular expression; setting a first regular expression as a regular expression matching the string; resetting the regular expression with a second regular expression, of a next row of the parser table, that formulates the string more specifically than the first regular expression; and selecting the predefined data type in the row of the regular expression as the predefined data type of the string, upon performing the resetting for all rows of the parser table. The target application previously associated with a combination of the identified data type and a source application containing the string is identified and launched with the string as a parameter. | 12-25-2014 |
20150058635 | GENERATING AND PROCESSING AN AUTHENTICATION CERTIFICATE - A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media. | 02-26-2015 |
20150082202 | UTILIZATION OF AN INSTANT MESSAGING ENVIRONMENT - A method and system for utilizing an instant messaging environment. An instant messaging client is created in association with each respective end user of at least two end users. Each instant messaging client in association with its respective end user includes at least two zones. Each zone corresponds exclusively to a unique end user. Each zone of the at includes at least two textboxes contiguously distributed within each zone. The at least two zones of each instant messaging client is configured to include a write-only zone specific to the respective end user and a read-only zone specific to each end user of all other end users exclusive of the respective end user. Each instant messaging client is provided to each respective end user of the at least two end users. | 03-19-2015 |