Abstract:
An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG.
Abstract:
The present disclosure is directed to a method for facilitating ride sharing among a plurality of commuters having a common starting location. The method may comprise receiving a leaving status set by a first commuter; retrieving a set of predefined attributes of the first commuter from a repository; sending a travel request to a central manager, the travel request comprising the set of predefined attributes of the first commuter; analyzing the set of predefined attributes to determine a list of potentially matching commuters; broadcasting the travel request to the list of potentially matching commuters; determining a list of confirmed matching commuters based on responses from the list of potentially matching commuters; forming an agreement between the commuters; and setting a new status for the first commuter and each of the list of confirmed matching commuters, the new status indicating completion of ride sharing matching.
Abstract:
Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established.
Abstract:
The disclosure relates to a method for tracking and routing multiple vehicles by collecting travel route information from a first vehicle by a plurality of collectors, each of the plurality of collectors positioned at a respective location throughout a travel route of the first vehicle; identifying a second vehicle at a first of the plurality of the collectors and directing the second vehicle through the travel route of the first vehicle by identifying the travel route of the first vehicle to the second vehicle at each of the plurality of collectors; compiling travel data from each of the first vehicle and the second vehicle to determine a travel time for the first vehicle and a travel time for the second vehicle, the compiled travel data defining the travel time as a function of a traffic pattern and a traffic light sequence.
Abstract:
A method and system for communicating electronic messages among clients in a network is provided. One implementation involves marking an electronic message to indicate that the message is to be routed to recipient clients identified by a user group definitions, sending the marked message from a sender client to a proxy client, parsing an incoming message at the proxy client to detect an indication that the message is to be routed to recipient clients in a user group, and routing the message from the proxy client to one or more recipients in the user group based on the user group definition.
Abstract:
Methods, systems, and computer program products for entering data into a web page by means of a data processing system. The method includes detecting a wireless device and forming a communication link between the data processing system and the wireless device. The method also includes retrieving data from the wireless device. The method also includes populating fields in the web-page with the retrieved data.
Abstract:
An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices.
Abstract:
An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices.
Abstract:
Methods, systems, and computer program products for entering data into a web page by means of a data processing system. The method includes detecting a wireless device and forming a communication link between the data processing system and the wireless device. The method also includes retrieving data from the wireless device. The method also includes populating fields in the web-page with the retrieved data.
Abstract:
Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established.