摘要:
A method, system, and program for time controlled network use are provided. A time controller counts an amount of time utilized by a particular user in accessing at least one web page via a network. Then, in response to the counted amount of time reaching at least one time limit for the particular user, the time controller initiates an action to control further accesses via the network by the particular user, such that an amount of time the particular user spends making network accesses is limited.
摘要:
An apparatus, system and method of identifying a vehicle that may present safety threats to security areas are provided. When a vehicle is approaching a security zone, a request for identification (ID) is issued to the vehicle's on-board computer system (OBCS). Upon receiving the ID, a comparison is made between the ID of the vehicle and a list of suspect vehicle IDs. It there is a match, the vehicle is considered to be suspect and the OBCS is instructed to take control over the vehicle.
摘要:
Search results for linked sources of information are associated with one or more predefined symbols or icons that indicate characteristics of the linked sites' contents. Site content ratings services and databases are co-opted to obtain additional site characteristic opinion, review results, and indicators. A search engine creates a set of characteristic factors associated with its index of web sites, and when providing a site reference as a result of a search operation, includes icons and symbols to indicate the characteristics to a user. Further sorting, filtering and searching according to the user's preferences may be performed.
摘要:
A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.
摘要:
A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.
摘要:
A mechanism is provided for augmenting the mail header of a message with a list of digital signatures representing the chain of contributors to the message. The augmented header may also encode the actual contributions corresponding to each digital signature. The list is appended every time a message is forwarded. If a message has a portion with no corresponding digital signature or if one or more of the digital signatures is not trusted, the user may handle the message accordingly. Furthermore, a mail server or client may discard a message if the number of digital signatures exceeds a threshold to filter out unwanted messages, such as e-mail chain letters.
摘要:
A method, apparatus and program for notifying an electronic address of the presence of physical mail in a designated mailbox is provided. The presence of at least one piece of mail in the mailbox is detected and an electronic notification is transmitted to the address indicating the presence of the at least one piece of mail.
摘要:
A method, program, and system for checking the availability of goods and services by means of the Internet are provided. The invention comprises compiling a customer profile, which may include information related to business affiliation as well as personal preferences. The customer uses a general search engine to submit a query regarding a desired good or service, and the search engine returns a list of suppliers that satisfy the search generic criteria. Special software on the client machine then sends more detailed queries, along with the customer profile, directly to certain suppliers selected from the list. These suppliers then return information, which corresponds to the customer profile. This information may include availability of specific accommodations, special discounts, as well as exclusive goods or services not offered to the general public.
摘要:
A method, system, and computer program product for processing traffic tickets is provided. In one embodiment, a department of motor vehicle (DMV) server receives, from a portable law enforcement data processing system via a network, citation data and stores the citation data. The DMV server then determines and notifies a court of jurisdiction of the citation data and receives, via the network, instructions from a client representing an accused about how the accused would like to proceed with the case. Based on the instructions received on behalf of the client, the DMV server modifies the citation data.
摘要:
Timing parameters that influence an install time interval for installing a product on computing machines in a test environment in accordance with an installation configuration option are identified. A test value of the timing parameter and a test value of the install time are determined for each of the computing machines. The test values of the timing parameter and the install time determined for the sample computing machines are analyzed to determine an install time calculation expression for the installation configuration option. For installation in accordance with the installation configuration option in a normal operating environment, a current value of each of the timing parameters of the predetermined install time calculation expression for the installation configuration option. The install time interval in the normal operating environment is estimated based on the current value of the timing parameters and the install time calculation expression.