摘要:
Methods, systems, and media are disclosed for managing multiple email addresses, each of which are associated with a known contact, e.g., a specific person. One embodiment includes selecting email addresses for an email to be sent through a computer system in communication with a mail server, wherein the email addresses comprise an email distribution list. Further, the method includes querying, before sending the email, for duplicate contacts associated with the email addresses in the email distribution list for the email. Further still, the method includes updating, after the querying, the email distribution list to the email addresses left in a remaining email distribution list produced through removal, if any, of the duplicate contacts identified by the querying. Finally, the method includes sending the email to contacts associated with each of the email addresses in the remaining email distribution list, wherein the contacts are in communication with the mail server.
摘要:
A Centralized Authentication & Authorization (CAA) system that facilitates secure communication between service clients and service providers. CAA comprises a Service Request Filter (SRF), a Service Client Authentication Program (SCAP), a Service Authorization Program (SAP), and an Authorization Database (ADB). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. In the preferred embodiment, the SRF forwards the service request to a web service manager. The web service manager invokes SCAP. SCAP matches the identifier with a record stored in ADB. SAP queries ADB to determine if the service request is valid for the service client. If the service request is valid, SAP authorizes the service request and the appropriate service provider processes the service request.
摘要:
A system and method for providing implementing proxy handling of instant messages and the like, wherein proxy recipients are designated by an original recipient, and one or more redirection rules are established indicating conditions under which said designated proxy recipients are to be sent redirected messages. When an instant message is received directed towards the original recipient, the redirection rules are evaluated and the message is redirect to a designated proxy recipient according to the redirection rules, with the display of the received message being suppressed or blocked on the intended original recipient's user interface.
摘要:
A weighted search program is disclosed. The weighted search program may be integrated into a translation program, or the weighted search program may be used independently with an available search engine. When integrated with the translation program, setting and weighting may be combined in a single search. In one embodiment, the weighting would be used in conjunction with a Pin Yin translation program so that a user could set some terms, and allocate a search weight to the remaining terms. The invention may be applied independently in Internet searching so that a user can apply weights to multiple elements of a search term.
摘要:
A program or system function on a computer system is automatically invoked by receiving a user-selected first insertion point or replacement area within a first user interface to a destination computer file. Subsequent to receiving the first insertion point within a destination file, a second user interface to content of a source computer file is provided upon user command. Then, responsive to a user highlighting text within the second user interface, the highlighted text is automatically copied from the application program to a clipboard buffer. Auto-trigger rules are searched for a rule which correlates to said highlighted text copied to the clipboard and, upon finding a correlating rule, one or more programs or system functions are invoked according to the found rule without need to modify or change said application program.
摘要:
A data restructuring method and system. The method includes receiving by a computing system from a first user content data arranged in a first specified order and a command for tagging portions of the content data according to various parameters. The computing system assigns identification tags to the portions of the content data. The computing system presents the identification tags to the first user. The computing system receives from the first user, a selection of at least one of the identification tags. The computing system restructures the content data into a second specified order in response to the selection. The computing system receives a request for viewing the content data from a second user. The computing system presents to the second user, the content data in the second specified order.
摘要:
A method and system for automatically creating a webpage using a scanned file created from a hard copy. A lookup table correlates a particular text symbol, such as a dollar sign (“$”), to a specific functionality. For example, if a chart in the hard copy has a dollar sign before values in the chart, then the lookup table associates the dollar sign with a pointer to an HTML routine (object) for creating an input box in a webpage. The HTML routines can be used to create new webpages or to modify existing webpages.
摘要:
A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.
摘要:
The present invention is a method for locating an asset in a facility. An example of an asset is a vehicle and an example of a facility is a parking facility. When the user enters the facility with the asset, the user receives a base and code from a base/code booth. The code may be stored on a removable card. The user secures the asset by entering the code. While the user is away from the facility, the present invention monitors the base for movement detected by the motion sensor. When the user returns to the facility, a locator panel displays the location of the asset. The present invention determines the location of the asset by triangulation using the locators. The user then returns to the asset, deactivates the motion sensor, returns the base and code to a base/code booth, pays for the storage services, and exits the facility.
摘要:
A method, system, and computer program product for national language support. National language support for an application is provided by recording translations of a text string in corresponding different languages in a single property file so as to allow display of the translations in the property file. One of the translations of the text string recorded in the property file is selected for use by an application based on a locale associated with the execution of the application and the selected one of the translations is used in the execution of the application.