Patent application number | Description | Published |
20080211676 | SYSTEM FOR TAMPER DETECTION - The present invention relates to a system for tamper detection. A tamper detection system in accordance with an embodiment of the present invention includes: a passive electronic sensor including a circuit having first, second, and third nodes; a load connected between the first and second nodes of the circuit; a friable electrical connection element connected between the second and third nodes of the circuit; and a storage unit, connected to the second node of the circuit, for storing an identification code of the sensor; wherein in use a voltage is applied across the first and third nodes of the circuit, and when the friable electrical connection element is intact, the second node of the circuit is at a first voltage, and when the friable electrical connection element is broken, the second node of the circuit is at a second voltage. | 09-04-2008 |
20080294533 | SYSTEM FOR TRANSFERRING LARGE SUPPLIER CATALOGS THROUGH THE INTERNET NETWORK - System for transferring large supplier catalogs in a data transmission system including the Internet network, a marketplace site able to be addressed through the Internet network, a first plurality of customers connected to the Internet network and a second plurality of suppliers connected to the Internet network, each supplier having a catalog file of available goods to be supplied to any customer. A supplier requests the transfer of its catalog file to the marketplace site through a B2B gateway by using a catalog control protocol. The catalog file is transferred to the marketplace site through a catalog gateway by using a catalog transfer protocol. The catalog file received from the supplier is aggregated to a general catalog. The updated general catalog is published onto a storefront web site so that any one of the customers can view the goods of the supplier. | 11-27-2008 |
20090158090 | DATA ENTRY RETRIEVAL - The present invention provides for the recovery of characters entered into at least one data entry zone of a data entry window. A method in accordance with an embodiment includes: storing a first image of the data entry window during data entry; subtracting a reference image from the first image to obtain a delta image, wherein the reference image is an image of the data entry window without data entered; identifying at least one non empty zone of the delta image and the location of the at least one data entry zone on the data entry window from the location of the at least one non empty zone on the delta image; extracting at least one character by applying optical character recognition to the least one non empty zone; and inputting the at least one character into the location of the at least one data entry zone. | 06-18-2009 |
20090158140 | METHOD AND SYSTEM TO SECURE THE DISPLAY OF ADVERTISEMENTS ON WEB BROWSERS - A method and system to secure the display of advertisements on web browsers. A method according to an embodiment includes: interpreting a markup file in a virtual machine, converting displayable elements of the markup file to one or a plurality of images and constructing a modified markup file comprising the at least one image file and a scripting language code adapted to cause a user terminal upon which it is executed to transmit coordinate information defining the position of a user-controlled cursor and action information defining a clicking action. | 06-18-2009 |
20090292984 | METHOD AND SYSTEM TO SELECTIVELY SECURE THE DISPLAY OF ADVERTISEMENTS ON WEB BROWSERS - A method and system to selectively secure the display of advertisements on web browsers. A method in accordance with an embodiment includes: defining a particular displayed area of the interpreted markup file; obtaining the DOM tree of the interpreted markup file, the DOM tree comprising parent and child nodes, each node being associated with displayable elements; identifying in the DOM tree a set of child nodes whose displayable elements comprise the particular displayed area; identifying in the DOM tree a first parent node comprising the set of child nodes; converting displayable elements associated with the identified first parent node to an image; generating a second parent node comprising the image; and modifying the DOM tree into a modified DOM tree by deleting the identified set of child nodes and by replacing the identified first parent node by the second parent node. | 11-26-2009 |
20090315685 | METHODS AND SYSTEMS FOR RFID TAG GEOGRAPHICAL LOCATION USING BEACON TAGS AND LISTENING TAGS - RFID method and system are provided. A reader transmits a reader signal to beacon tags and a listening tag. The beacon tags transmit beacon signals including a beacon identification and a beacon distance to the reader. The listening tag receives the beacon signals. Neighbor distances are calculated for the beacon tags based on when the beacon signals are received, when the listening tag receives the reader signal, and a constant processing time. The neighbor distances are the individual distances from the listening tag to the beacon tags. A list is stored including the beacon identification for the beacon tags, the beacon distance, and the neighbor distances. The listening tag transmits the list and a listening tag identification to the reader. A geographical position of the listening tag is calculated based on the beacon distance, beacon coordinates, and a listening tag distance which is from the reader to the listening tag. | 12-24-2009 |
20100042945 | APPLICATION WINDOW AREA CHANGE SURVEILLANCE - A method and system for monitoring a computer program window define an area of a computer program window and compute a hash value for the defined area. The computed hash value is stored and the hash value is recomputed for the defined area after a predetermined time period. The recomputed hash value is compared with the stored. If the stored hash value and the recomputed hash value are different, the method and system overwrite the stored hash value with the recomputed hash value, and generate a notification. Recomputing, comparing, overwriting and generating are performed periodically to monitor the changes in the defined area. | 02-18-2010 |
20100074420 | PHONE CALL MANAGEMENT - A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated. | 03-25-2010 |
20100097174 | Providing Parcel Procurement With Acknowledgement Of Receipt In An Intelligent Mailbox - A method for providing a procuration to a user on behalf of a letter or parcel recipient for authorizing this user to retrieve this letter or parcel with acknowledgement of receipt in an intelligent mailbox. Exemplary embodiments include a method to forward delegation between the original recipient and the delegated user through an exchange supported by any electronic or physical protocol of a delegation information made of the recipient unique identifier, a validity period and a hashcode, signed with the recipient private key and the mailbox public key. | 04-22-2010 |
20100097184 | METHOD AND APPARATUS FOR READING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag; interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs. | 04-22-2010 |
20100097185 | RFID TAG POSITIONAL ADDRESSING - The present invention is directed to a method and apparatus for radio frequency identification (RFID) tag positional addressing. A method in accordance with an embodiment of the present invention includes: activating a plurality of first RFID tags, wherein each first RFID tag emits an identification (ID) and a position; capturing the IDs and positions emitted by the first RFID tags using a plurality of second RFID tags, wherein each second RFID tag captures the IDs and positions emitted by the first RFID tags located in a vicinity of the second RFID tag, and wherein each second RFID tag determines its physical location based on the captured IDs and positions; and sending a read command including a position of a targeted one of the second RFID tags that is to be read, wherein only the targeted second RFID tag located at the position in the read command responds to the read command. | 04-22-2010 |
20100097196 | METHOD AND APPARATUS FOR VISUALLY LOCATING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for visually locating short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in the container, wherein each second RFID tag is coupled to a respective illumination source; addressing one of the first RFID tags; and activating the illumination source coupled to each second RFID tag that captured the ID of the addressed first RFID tag. | 04-22-2010 |
20100097222 | Insuring personal mail delivery with automatic acknowledgement - An intelligent mailbox and a method for authorizing a user to pickup a parcel with acknowledgement of receipt in a mailbox. Exemplary embodiments include a method to insure personal mail delivery in a mailbox, the method including determining a first biometric data as required by an RFID tag enclosed in a parcel having been previously introduced in the mailbox, determining an insertion of a second key including a second biometric data into a biometric reader, determining if the second biometric data is granted a procurement to pickup the parcel, opening a biometric lock if the second user is granted a procurement, opening a traditional lock if the biometric lock has been opened, displaying one of an indication to a user of the presence of the parcel and an indication to a postman and recording a pickup of the parcel. | 04-22-2010 |
20100099398 | CALL MANAGEMENT SYSTEM - A system, method and program product for managing inbound calls on a mobile device. A system is provided that includes: a mode control system for allowing the mobile device to be set to a do not disturb (DND) mode; a system for calculating dynamic information when an inbound call is received; and a call processing system for broadcasting a message when the mobile device is in the DND mode, wherein the message includes the dynamic information. | 04-22-2010 |
20100117797 | CLOSURE WITH PASSIVE ELECTRONIC SENSOR FOR TAMPER DETECTION AND RELATED METHOD - A closure includes a closing member for sealing an opening of a pressurized container. The closing member may include a passive electronic sensor coupled thereto that includes a status register that may be readable by, for example, a RFID reader. The status register is responsive to a pressure change in the pressurized container caused by an insertion of the closing member into the opening or an extraction of the closing member from the opening. The status value in the status register indicates whether the pressurized container has been tampered with. An identification register may include a pressurized container identification encrypted with the private key of the manufacturer, which can be decrypted for comparing to identification on the pressurized container to identify tampering. | 05-13-2010 |
20100131478 | SYSTEM AND METHOD FOR LOADING A CALLED CLASS FILE TABLE WITH DATA INDICATING A HIGHEST VERSION OF A CLASS FILE - A system and a method for loading a called class file table with data indicating a highest version of a class file of a software application are provided. The method includes retrieving a first class version dependency file associated with a first class file, having both a first class name and a first version number associated with a second class file that is called by the first class file. The method further includes adding a first record to the called class file table having both the first class name and the first version number associated with a second class file, and retrieving a second class version dependency file associated with a third class file. The second class version dependency file has both a second class name and a second version number associated with a fourth class file called by the third class file. The method further includes if the second class name is identical to the first class name in the called class file table and the second version number is higher than the first version number, then updating the first record in the called class file table with the second class name and the second version number. | 05-27-2010 |
20100153644 | ON DEMAND JAVA APPLICATION MANAGER - A system, method and program product for providing an on demand Java application manager. A system is provided that includes: a bootstrap system for setting up a cache within a local storage and pointing to at least one application at a network resource; a class loader that loads class files for a selected application into the JVM in an on demand fashion, wherein the class loader searches for a requested class file initially in the cache and if not present downloads the requested class file from the network resource to the cache; and a disk management system that manages storage space in the cache, wherein the disk management system includes a facility for discarding class files from the cache. | 06-17-2010 |
20100159953 | Method and System to Locate an Object - A computer-implemented method, system, and computer program product for handling identification information emitted by a radio frequency device, and a radio frequency device for emitting identification information. The method receives and stores identification information transmitted by the radio frequency device, retrieves the identification information from the first mobile communication device, and inserts the identification information into the communication. The system includes a first mobile communication device, a second communication device, and an inserting means. The computer program product includes computer program instructions for carrying out the steps of the method. The radio frequency device includes an antenna adapted to operate in UHF frequency bands, an energy storage means adapted to be charged with energy captured through the antenna, an information storage means adapted to store information, and a transmission means adapted to transmit the information using the energy from the energy storage means. | 06-24-2010 |
20110064383 | METHOD AND SYSTEM OF CIRCUMVENTING CONTENT FILTERS - A method, computer program, and system for enabling remanence-based advertisement that is not likely to be blocked by adblockers. A method of converting a master image, such as an advertisement or a logo, into a master video, according to an embodiment, includes: dividing the master image into a plurality of sub-images; generating a plurality of video frames defining a master video, the video frames having dimensions of the master image; and inserting the plurality of sub-images into the plurality of video frames, such that a playing of the master video defined by the video frames visually renders the master image. | 03-17-2011 |
20120096254 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RETRIEVING DATA AT BOOT TIME - The invention provides a system for retrieving at boot time user data stored on a computer. The computer comprises a processor coupled through a system bus to I/O devices and to a system memory, the computer further having a basic input output system (BIOS) unit operatively coupled to the system bus for loading a computer operating system during a computer boot procedure, wherein the system memory being accessible to the computer operating system via the system bus. The system comprises a boot adapter for connecting the system bus to a boot bus, a boot memory coupled to the boot bus wherein the boot memory comprises storage locations for storing the predefined user data, and program code means coupled to the BIOS unit. The program code means are operative for loading a boot operating system during the computer boot procedure, the boot operating system having instructions for accessing the boot memory during the computer boot procedure. | 04-19-2012 |
20120185450 | METHOD AND SYSTEM TO HANDLE JAVA CLASS VERSIONING - There is disclosed a method of handling a given object class in an object-oriented environment, wherein it comprises, in response to the invocation of the given object class during runtime, the steps of: determining if the version associated with the given object class differs from a predefined minimal version and if so: (a) generating a new version of the object class from the previous version of the object class by invoking an interface method migrating an object class from a version to another; (b) extending the new object class by updating pointer links to the previous version of the given object class. The previous version of the object class may be maintained accessible after the object migration. | 07-19-2012 |
20130262318 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 10-03-2013 |
20140040491 | PROVIDING ACCESS TO MESSAGE HEADERS - Method and system are provided for providing access to string-based message headers in network protocol messages. The method includes: converting header names into canonical form, wherein a canonical key represents one or more equivalent header names including alias forms, and wherein a canonical key has a string and an integer value; providing a mapping between the header names and the canonical keys; and searching for a header name using the canonical key by sequential search using integer comparison. | 02-06-2014 |
20140040492 | PROVIDING ACCESS TO MESSAGE HEADERS - Method and system are provided for providing access to string-based message headers in network protocol messages. The method includes: converting header names into canonical form, wherein a canonical key represents one or more equivalent header names including alias forms, and wherein a canonical key has a string and an integer value; providing a mapping between the header names and the canonical keys; and searching for a header name using the canonical key by sequential search using integer comparison. | 02-06-2014 |
20140330728 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 11-06-2014 |