摘要:
A system and method for providing warranties that financially guarantee one or more facts associated with an electronic transaction. In a preferred embodiment, warranties issued to the present system comprise a contract between a first party and a second party in which the first party: (1) warrants one or more warranted facts (2) for damages up to a warranted amount (3) if claimed by a relying customer within a claim period. The warranty is preferably issued by a participant in response to a request received from a customer that specifies a desired warranted amount and claim period. The participant and root entity evaluate the request in light of a plurality of factors and determine whether or not the warranty should be issued. In a preferred embodiment, the warranty comprises a contract between the buyer and its issuing participant. The seller is preferably a third-party beneficiary of this contract.
摘要:
An integrated self-supporting and deformation-resistant modular driver's cabin structure for mounting to the front end of a rail vehicle body and for providing a driver space and a windshield opening, is composed of a composite sandwich structure with a single, common, continuous outer skin layer, a single, common, continuous inner skin layer and an internal structure wholly covered with and bonded to the inner and outer skin layers, the internal structure comprising a plurality of core elements. The driver's cabin structure comprises at least: side pillars each having a lower end and an upper end, and an undercarriage structure at the lower end of each of the side pillars. The fibre-reinforced sandwich located in the side pillars is provided with several layers of fibres oriented to provide a high bending stiffness. The fibre-reinforced sandwich of the undercarriage structure is such to transfer static and crash loads without flexural buckling.
摘要:
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests a decryption key for a local encrypted vault file from a network server by supplying a personal identification number (PIN) from the user through the input device, a copy of the GUID, and a signature of GUID using a private key for the root certificate. If a decryption key is returned from the network server, the local encrypted vault file is unlocked and automatically supplies a corresponding user ID and password to log-on to the third-party website without the user.
摘要:
A volume analyzer is provided. The volume analyzer includes an input, a processor, and an output. The input is operable to receive market data and a calculation policy. The processor is coupled with the input. The processor is operable to identify an available implied pattern based on the market data and the calculation policy. The available implied pattern has not been calculated by a match engine. The output is coupled with the processor. The processor is operable to provide the available implied pattern to the output.
摘要:
A disc type wood chipper that utilizes a high percentage of the energy required for chipping but not substantially utilized in the material size reduction within the machine to produce chips of a small enough size such that the chips produced can be turned into wood flour or wood pellets with the expenditure of very little additional energy.
摘要:
A method and apparatus for assembling an exhaust component includes providing a substrate assembly with a substrate body and a mat wrapped around the substrate body. A gauging system is used to determine a hoop stress for the substrate assembly and is used to predict a shrinking diameter for an outer shell that is to receive the substrate assembly based on the hoop stress.
摘要:
An alias can be used to access address book information across multiple communication applications. The alias can also be a screen name, for example, an instant messenger screen name. However, the alias can be used to access more than just instant messenger contact information; it can be used to access other information, including telephone numbers, SMS, EMS and MMS contact information as well as instant messenger contact information. Additionally, the single alias can be used to access instant messenger contact information across multiple instant messenger services. An alias can be assigned that is easy to remember; for example, it can be a shortened version of the contact's name, or a nickname.
摘要:
A method and apparatus to facilitate giving a discount to a consumer subsequent to a point of sale purchase. A merchant, manufacturer, and/or a consumer agree in advance with a financial account issuer to give a discount on qualifying purchases. The merchant and/or manufacturer may access an intranet provided by the financial account issuer and input instructions related to one or more discount programs. During a point of sale purchase, a consumer and merchant agree to a purchase price for a particular good and/or service being purchased by the consumer. The merchant requests payment authorization from the financial account issuer for the full (gross), agreed upon purchase price. If the purchase qualifies for a discount under one or more discount programs, the consumer's financial account is charged the full, agreed upon purchase price, and subsequently credited one or more discounts the transaction qualifies for without the consumer needing to perform a secondary task(s).
摘要:
Described are techniques for testing an application. A test script including one or more instructions is received to test an application. A user interaction with a user interface of the application is emulated. Emulating includes executing a first portion of instructions in the test script. An output is received including information displayed using the user interface in response to the user interaction. Verification processing is performed for the output. The verification processing includes executing a second portion of instructions in the test script. A first instruction in the test script references a user interface data element without specifying a complete path for the user interface data element.
摘要:
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests a decryption key for a local encrypted vault file from a network server by supplying a personal identification number (PIN) from the user through the input device, a copy of the GUID, and a signature of GUID using a private key for the root certificate. If a decryption key is returned from the network server, the local encrypted vault file is unlocked and automatically supplies a corresponding user ID and password to log-on to the third-party website without the user.