摘要:
A system and method for providing a Contact Management System (CMS) so that individual owners of personal contact data may control and manage the access and dissemination of the personal data. The owner of personal contact data may securely register the data with secured information vault of the CMS and specify which other parties may have access to the personal data. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party's device, such as a telephone or a PDA may access the CMS database and under public key infrastructure (PKI) controls identify themselves so that access to the owner's personal data may be verified. Once verified, the telephone number or other data may be returned to the device where a call may be automatically placed or otherwise used.
摘要:
Disclosed are a method and a system for the secure delivery of requested, valuable and/or time sensitive packages by authorized delivery agencies, without requiring that the recipient be present. Generally, in accordance with the present invention, a package is delivered to a specially designed receptacle such as a bin or a specially designed mailbox. The receptacle accepts the package if it is an expected package delivered by the expected delivery agency. Two specific implementations of the present invention are disclosed herein. The first has minimal impact on the order and delivery infrastructure existing in the world today. The second implementation is a more integrated approach, but requires that sales and delivery entities implement the interfaces to the secure package delivery bin solution.
摘要:
A method and system for searching a collaborative document database. The method comprises the steps of providing parent documents and child documents in said database; and for each parent document, building an index document listing a portion of said child documents. The method comprises the further steps of providing a search term, and searching all said index documents for said search term. Preferably, each child document is related to at least one of the parent documents; and the building step includes the step of identifying in the index document for each parent document, at least some of the child documents related to the parent document. With this embodiment, the searching step may include the step of, for each parent document, searching for the search term in the child documents identified in the index document for the parent document.
摘要:
A tray for cylindrical geological cores comprises a base plate of sheet material shaped to have therein longitudinally extending grooves which are each in the shape of a frustum of a triangle so that the cores can rest against the triangular sides. The tray has robust side members below support surfaces at its edges running parallel to the grooves whereby a second similar tray can be stacked thereon. At its ends the core tray has handles which serve as transverse re-inforcing means for the core. The shape of these handles is such that information about the cores in the tray can be recorded thereon. Drain holes are provide in the tray at the ends of the grooves to permit any water that might have entered the tray to escape.
摘要:
A bracket is mounted to a motor face plate with the bracket having all of its wall surfaces in abutment with elongate resilient cushion members. Reaction of the motor housing to motor output shaft torque loads is cushioned by the resilient members which are non-uniformly compressed by the motor face plate bracket. A wall structure with right angular wall components carries the yieldably supported face plate bracket and cushion members.
摘要:
A system and method for providing a Proxied Contact Management System (PCMS) so that individual owners of personal contact data may control and manage the access and dissemination of their personal data and also control who may contact them. The owner of personal contact data may securely register the data with a secured information vault of the PCMS and specify which other parties may contact them. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party's device, such as a telephone or a PDA may request that the PCMS, under public key infrastructure (PKI) control, establish a connection with the first party. Once verified, the PCMS may establish a proxy connection between the first and second parties according to the permitted mode of communication defined by criteria established by the first party and managed by the PCMS. In this way, personal contact information, such as a telephone number, is kept secure and private and not provided to the second party.
摘要:
An anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection method, and program for the same. An anomaly detection system which has a plurality of industrial control systems (hereinafter “ICS”s) which are connected to the network, an integrated analyzer which receives the operational status of each ICS as monitoring data in order to identify an ICS for which an anomaly is suspected so as to perform an anomaly assessment, a receiving unit provided for each ICS which receives data from other ICSs, a transmission unit which transmits data to other ICSs and transmits the monitoring data to the integrated analyzer, a security policy which includes recording of data and generation rules, and a wrapper which refers to the security policy in order to control the data so as to transmit the same to other ICSs.
摘要:
A system or computer usable program product for managing a set of active straps for a positive airway pressure (PAP) mask including detecting a pressure value with a pressure sensor, analyzing the pressure value with a processor for identifying an adjustment of the set of active straps, and performing the identified adjustment with the set of active straps.
摘要:
A method for monitoring water consumption. A set of locations in a fluid transport system in a structure is monitored for sounds generated by a fluid flowing at an endpoint of the fluid transport system. Current acoustic data is generated for the sounds detected from monitoring the set of locations. The current acoustic data is compared with historical acoustic data to form a difference. A determination is made as to whether the difference exceeds a threshold. An action is performed in response to determining that the difference exceeds the threshold.
摘要:
A system and method for exposing internal search indices to Internet search engines. The internal search indices are exposed to external search engines in such a way that the data may be segregated into at least two types including one layer of search data specifically for the search engines, and another for potential users of the application. This significantly improves the probability of discovery by search engines and also provides for presentation of discovered content to users in a manner consistent with the content itself, or consistent with the intended controls or presentations established by the content's owner. The system and method also includes one or more components that reproduce information about IP in a format that search engines can recognize and locate. The component also forwards users coming through the search engines to the actual IP graphical user interface (GUI) instead of the files that the search engine discovered. This allows control over the information that search engines see/view, while ensuring that a user's interface to the system stays constant.