Abstract:
System architecture for network connected applications, devices, users, and web services providing security effected by means for managing interaction with an authentication library that effects a correlation between the use and creation of library entries having predetermined correlation indicia for effecting strong authentication of users and participants within the network. A common authentication service (CAS) based upon an XML or web services protocol is described.
Abstract:
The present invention permits a user to conduct remote transactions without a network while using an untrusted computing device, such as a hand-held personal digital assistant or a laptop computer. The computing device is augmented with a smartcard reader, and the user obtains a smartcard and connects it to the device. This design can be used by an untrusted user to perform financial transactions, such as placing bets on the outcome of a probabilistic computation. Protocols are presented for adding (purchasing) or removing (selling) value on the smartcard, again without requiring a network connection. Using the instant protocols, neither the user nor the entity issuing the smartcards can benefit from cheating.
Abstract:
The present invention is a system and method of conducting refund transactions via electronic transaction records. System user transaction information entered into the system is stored in association with user biometric information. Transaction information is retrieved via user biometric recognition/verification for conducting refund transactions.
Abstract:
A system for disposing of medical waste is generally configured to sort waste items into a plurality of disposable containers according to applicable rules and regulations governing the handling and/or disposal of such items. In some embodiments, a system comprises sorting stations, each of which houses a number of disposable containers. Each station can identify an item of waste, determine the most appropriate container for the item, and facilitate disposal of the item in the appropriate container.
Abstract:
A method, system and apparatus for identifying malfunctioning remote devices, such as point of sale devices, are disclosed. In operation, a performance history for one or more remote devices is built and a normal operating day is determined from the performance history. Also extracted from this performance history are average and variance values for various aspects of satisfactory remote device performance. During remote device evaluations, the current operating performance of each remote device is compared with the normal day and the average and variance values for the respective remote device. For remote devices operating outside of the normal day, average and variances values, a likelihood estimate that the remote device is actually malfunctioning is calculated. For remote devices determined likely to be malfunctioning, an approximation of the remote device's losses are made such that the remote device with the greatest losses may be prioritized for maintenance or other purposes.
Abstract:
Methods, systems, and apparatus, including computer program products, for a rental service through a computer network. A collection of virtual containers is assigned to a set of users including one or more users. Each virtual container in the collection is configured to identify one or more software products that are rented by users in the set. A user in the set is authorized to access a software product through the computer network based on whether the software product is identified as a rented software product in one or more virtual containers of the collection assigned to the set of users.
Abstract:
Systems and techniques associate one or more dynamic attributes with one or more opportunities representing potential commercial transactions. Each opportunity may include one or more static attributes that are automatically associated with the opportunity. Each opportunity may further include one or more dynamic attributes. Subsequent to their creation, dynamic attributes may automatically be associated with each opportunity, with each opportunity of a particular type, with one or more opportunities meeting a certain criterion, or may be generated by a user for a particular instance of an opportunity.
Abstract:
A method (and system) of conducting business electronically between a first party and a second party, includes providing a third party who knows the identity of the first party but no privacy-compromising information regarding a proposed electronic business transaction between the first and second parties, and conducting the electronic business transaction between the first and second parties through the third party such that the identity of the first party is kept from the second party.
Abstract:
A compressed experiential learning system is created by determining high-level goals and objectives, determining roles and objectives for each role, developing a learning environment including physical and technical components, developing an instructional environment, and creating evaluation plans.
Abstract:
A server or Internet service provider computer selects a soliciting merchant and an outputting merchant based on various factors. In one embodiment, the soliciting merchant is selected is its activity rate (e.g. sales rate) is low. The outputting merchant provides offers for bonuses to customers on behalf of the soliciting merchant. The bonus is provided to the customer in exchange for consummating a transaction with the soliciting merchant. Thus, the soliciting merchant benefits from the increased patronage such offers encourage.