Abstract:
A method, apparatus, and computer instructions for a method for ordering food from a restaurant. A hot spot location is provided for the restaurant. The hot spot provides for wireless communications with a wireless device for a user. In response to detecting the wireless device within the hot spot location, a determination is made as to whether user preferences are stored within the device. The user preferences include charge information and order information. In response to user preferences being present, an order is placed using the order information and the user is charged for the order.
Abstract:
A method and device for receiving a voice mail from a cellular phone service provider utilizing a satellite radio. When the cellular phone service provider determines that a called party's cellular phone is unable to receive a call because the called cellular phone is not within a live cell, the calling party is prompted to leave a voice mail message. The voice mail message is uplinked to a space satellite, which transponds the message to a one-way satellite radio receiver. The radio receiver sends the voice mail message to a coupled recorder. A repeater, coupled to the recorder, then transmits the voice mail message to the called cellular phone to a highly limited zone. The called party's cellular phone then receives the voice mail message as if it were one-way cellular phone call.
Abstract:
An automatic teller machine capable of sending a facsimile of a check, money order, or other payment instrument to a payee designated by a user. The user inserts cash or allows an account to be debited to pay for the payment instrument, and the automatic teller machine faxes the payment instrument to the payee.
Abstract:
An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and method, a first party generates the secured communication connection object by setting parameters identifying and limiting the use of the secured communication connection object for establishing communication connections with the first party. These parameters are encapsulated with contact information for the first party such that the contact information is encrypted. The resulting secured communication connection object is then transmitted to a second party's communication device. When the second party wishes to establish a communication connection with the first party, the secured communication connection object is accessed in memory using information obtained from the object registry, the contact information is decrypted, and a communication unit is provided with the contact information for establishing a communication connection.
Abstract:
A computer implemented method, apparatus, and computer usable code for shredding objects. The apparatus has a number of components including a receptacle that is configured to receive objects. A shredding unit is connected to the receptacle, wherein the shredding unit selectively destroys the objects placed into the receptacle. An object detector is used to detect the presence of an object in the receptacle. An object identifier identifies objects placed into the receptacle. The apparatus also has a memory and a connector. The connector is used to establish a communications link with a data processing system. A controller in the apparatus stores identifications of objects identified by the object identifier in the memory and sends a signal to the shredding unit to control shredding of the objects.
Abstract:
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
Abstract:
The present invention is directed to a method and system for altering an administrator of a multi-way call during the multi-way call connection and transferring the associated charges from one administrator to another. After a multi-way call connection is established from the originating party to many participating parties, the originating party may be given an opportunity to shift an administrator role to one of the participating parties. The participating party designated to be a new administrator may accept or refuse the request from the originating party. Once the participating party accepts the new administrator role, the subsequent charges may be transferred to the participating party and the originating party may be able to continue in or to drop out from the multi-way call without further responsibility of charges.
Abstract:
A method, apparatus, and computer instructions for making reservations or placing orders. A wireless hot spot location is provided in which reservations can be made with a plurality of vendors through the wireless hot spot. A determination is made as to whether a user desires to make a reservation with a selected one of the plurality of vendors in response to receiving a user input from a wireless device in communication with the wireless hot spot. User preferences associated with the user is retrieved in response to a determination that the user desires to make the reservation. The reservation is made using the user preferences.
Abstract:
Methods, systems and computer program products for providing roaming services to a wireless telephone roaming outside of its home service area by receiving a request for roaming service from a wireless telephone that is within a roaming network and offering a special roaming contract to the user of the wireless telephone. The request for services comprises an identify of the wireless telephone wherein the identity comprises the mobile identification number and the electronic serial number. Using the identity of the wireless telephone received in the request, the roaming network determines that the wireless telephone identity is not recorded as a record within the roaming network and is therefore roaming. The method provides offering a special roaming contract to the user and then executing the special roaming contract if the user decides to accept the offer for a special roaming contract.
Abstract:
Methods, systems, and computer program products are described for check settlement, including a merchant's receiving a check from a customer; entering check settlement information as digital data stored in computer memory; and printing the check settlement information on the check. Typical embodiments also include depositing the check and settling the check with no need to repeat the steps of entering and printing the check settlement information. In typical embodiments, check settlement information comprises merchant endorsement information and check-specific information. In such embodiments, entering check settlement information typically includes entering merchant endorsement information before receiving a check and entering check-specific information upon receiving a check.