Patent application number | Description | Published |
20080222000 | Systems and Media for Awarding Credits Based on Provided Usage Information - Systems and media for awarding credits based on provided usage information are disclosed. More particularly, hardware and/or software for collecting and disseminating usage information related to electronic documents and for awarding usage credits to users in exchange for providing usage information are disclosed. Embodiments include receiving an indication of the usage of an electronic document by a user and aggregating the received usage indication for the document with usage indications relating to other users. Embodiments may also include creating document utilization information for the electronic document based on the aggregated usage indications and awarding usage credit to the user based on the user's providing statistics on the usage of the electronic document. Further embodiments may include transmitting an indication of the awarded usage credit to the user and receiving a request to use the usage credits, | 09-11-2008 |
20080232892 | APPARATUS AND METHOD FOR PROVIDING PRINTER SEPARATOR PAGES - An arrangement is provided wherein a printer used with a host device is operated to generate print batch separator pages using the same blank sheets as are used to print respective pages of successive print jobs. The printer is directed to print a visually distinctive graphic indicator, such as a separator border, trim, header, visible banner or other visual indicator or markings. This eliminates the need for an additional printer separator page tray. Usefully, a host device is operated to generate a separator command in a specified PDL language. A printer control device receives the page separator PDL command, and software contained in the printer control converts the PDL command into a printer readable format (PRF). A printer component responsive to the PRF command then operates the printer to print the specified separator page. | 09-25-2008 |
20080240392 | Automated calling system for conference calls - A method and system are provided in which teleconference calls are scheduled in advance and, at an appropriate predetermined time, calls are automatically made to the designated participants of the conference calls thereby avoiding the need for the participants to call into a teleconference center. In a preferred embodiment, when teconferences are scheduled, the telecon participants are designated and their phone numbers are input or otherwise determined, for example, through access to a centralized database. A calendar is monitored and at a predetermined time relative to the scheduled start of the telecon, a server system application initiates the calling of the participants for connection to the telecon. The system may be configured to require participants to enter a password before the connection is completed. The status of the called participants is determined and displayed on individual display devices of the other participants in the telecon. In one example, designated participants are called back at selected intervals if the initial automated call is unanswered. | 10-02-2008 |
20080270807 | Method for Selective Encryption Within Documents - The present invention allows the user (author or creator) of a document to specify that certain portions of a document be selected for encryption while other portions of the document remain displayed as created. In addition, each encrypted section could have multiple encryption keys such that some viewers can review certain parts of the document while other viewers will not have that same access. The user could employ a standard word processing editor technique to highlight (or swipe) portions of a document that the user desires to be encrypted. The highlighted portion would then be tagged with a surrounding attribute indicating to the word processor that this highlighted portion of the document is to be encrypted. The highlighted sections would also have encryption keys associated with the highlighted and encrypted section. Any one of the encryption keys for that section would decrypt that section. With proper authorization, any encrypted portion of a document would be displayed as part of the document. Without proper authorization, the display of the document would only contain the unencrypted portions of the document. | 10-30-2008 |
20080275871 | SYSTEMS AND MEDIA FOR UTILIZING ELECTRONIC DOCUMENT USAGE INFORMATION WITH SEARCH ENGINES - Systems and media for utilizing electronic document usage information are disclosed. More particularly, hardware and/or software utilizing electronic document usage information to respond to user search requests with search engines are disclosed. Embodiments include receiving a search request from a requesting user and receiving document utilization information associated with one or more electronic documents, where the document utilization information provides an indication of the usage of the electronic documents by one or more users. Further embodiments include generating search results based at least partially on the search request and the document utilization information and transmitting an indication of the search results to the requesting user. Further embodiments include generating statistical information regarding the search results for electronic documents and transmitting the generated statistical information. | 11-06-2008 |
20080278348 | Determining Asset Location Via Local Triangulation - The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility. | 11-13-2008 |
20090037731 | Architecture and Design for Central Authentication and Authorization in an On-Demand Utility Environment Using a Secured Global Hashtable - A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall. | 02-05-2009 |
20090063677 | Systems and Media For Updating An Instant Messaging System - Systems and media for updating an instant messaging system on a network are disclosed. More particularly, hardware and/or software for updating status indicators such as ‘away’ messages of an instant messaging system are disclosed. Embodiments include determining that a change in status of the user has occurred and automatically transmitting an indication of the change in status to instant messenger system manager via a network. Embodiments include determining that a change in status of the user has occurred based oh receiving an indication that the user's status has changed, such as from user input on a keyboard, mouse, etc. Other embodiments, include determining that a change in status has occurred based on determining that the user's status has changed based on an electronic calendar, expiration of a time period, etc. | 03-05-2009 |
20090102721 | Apparatus and Method for Determining Asset Location Via Local Triangulation - The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility. | 04-23-2009 |
20090204810 | Architecture and Design for Central Authentication and Authorization in an On-Demand Utility Environment - A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request. | 08-13-2009 |
20090217308 | System Startup with Applications Using Configurable Options - Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for system startup with applications using configurable options. In one illustrative embodiment, the computer implemented method comprises obtaining a set of application entries and determining whether a set of property entries exist for the set of application entries. Having identified entries of the set of application entries to form a set of identified applications and responsive to determining the set of property entries exist, applying respective entries of the set of property entries to the set of identified applications, and conditionally starting the set of identified applications. | 08-27-2009 |
20090249083 | Method and System for Telephone Wait User Interface Selection - In the method of the present invention, a customer of a service provider would be placed in hold while waiting to speak to a customer service representative. The method and system of the invention would recognize the telephone number of the caller using a “caller ID” system. If this call is the first time the caller has ever called, the caller would be presented with an audible listing of listening choices that would include but not be limited to the latest news, the weather (of the caller's location), financial headlines, or a selection of music stations (via cable radio, for example). The caller would then speak or type his/her preference into the keypad and the selection would be played. If the caller does not like the selection, the caller can then speak another selection or type the new selection as many times as the caller prefers. The caller selection is recorded in a caller preference database. Finally, when the same customer calls one or more additional times, the system would retain the caller's number and preferred listening selection, based on caller ID value. The listening selection would automatically be played on subsequent calls. | 10-01-2009 |
20120117388 | SYSTEM FOR SELECTIVE ENCRYPTION WITHIN DOCUMENTS - A system for selective encryption within a document. A portion of the document selected and marked for encryption is detected, the selected portion of the document including plaintext. The detected portion of the document selected for encryption is encrypted as ciphertext. The document is displayed with the selected portion of the document encrypted. An attempt by an accessor to access the encrypted portion of document is detected. The encrypted portion of the document is decrypted with a proper decryption key, wherein the decrypting includes decrypting the encrypted portion of the document in response to presentation of required data by the accessor. The required data includes the proper decryption key, a name of the accessor, and an employee number of the accessor. The portion of the document is displayed as decrypted. | 05-10-2012 |
20130254083 | Payment device policy management - A method, apparatus and computer program product enables user-directed, selective control of payment transactions for a user's payment device. The techniques enable a payment device user to create and manage self-defined policies on how a particular payment device (tangible or intangible) may be used. This approach enables the end user, as opposed to the financial or commercial institution, to control transactions with respect to the account. Thus, for example, using a display interface, the account holder can control factors such as: allowed or disallowed vendors, a number of charges, timing of charges, a charge frequency, types of purchases allowed, and the amount charged. This fine-grained, device-specific control mechanism enables account holders to protect financial assets against fraudulent or improper activity. The approach provides a policy management system by which user-directed options for selectively controlling and restricting payment transactions may be realized, thereby providing better security and more customized account control. | 09-26-2013 |
20130254101 | Payment device policy management - A method enables user-directed, selective control of payment transactions for a user's payment device by enabling a payment device user to create and manage self-defined policies on how a particular payment device (tangible or intangible) may be used. This approach enables the end user, as opposed to the financial or commercial institution, to control transactions with respect to the account. Thus, for example, using a display interface, the account holder can control factors such as: allowed or disallowed vendors, a number of charges, timing of charges, a charge frequency, types of purchases allowed, and the amount charged. This fine-grained, device-specific control mechanism enables account holders to protect financial assets against fraudulent or improper activity. The approach provides a policy management system by which user-directed options for selectively controlling and restricting payment transactions may be realized, thereby providing better security and more customized account control. | 09-26-2013 |