摘要:
A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with a recommended inactive or storage maximum battery charge level which is obtained from a battery manufacturer or other data source. In one embodiment, the battery charging system accesses a battery manufacturer's website in order to determine the manufacturer's recommended charging characteristics, including a maximum battery charge level for an inactive or storage status, for the particular battery being charged. When connected to a power source, the battery being charged is not permitted to be charged to a fully charged state but rather charged only to the lower storage charge level in order to increase the life span of the battery.
摘要:
A data processing system and a computer implemented method is provided for adjusting the transparency of a display screen based on detecting motion in an area obscured by the display screen. When a motion is detected in the area obscured by the display screen, the transparency of the display screen is adjusted so that the motion is visible through the display screen simultaneously with any data being displayed on the display screen. The transparency may be adjusted depending on the location of the motion, pattern of the motion or both. Patterns of motions may be pre-defined to correspond with specific actions relating to the transparency of the display screen. Furthermore, depending on the location or pattern of the motion, one or more areas of the screen may be adjusted for transparency.
摘要:
A system, a method, and a service that monitors the time a space is occupied. The time period for occupation of the space may be prepaid or the fees may accumulate while the space is occupied. The system detects when an occupant enters the space and starts a timer. The system further provides a user interface whereby a user may prepay for an allotted period of time or may accumulate time in the space and then be billed later. Identifying information about the occupant may be acquired by an imaging device. The imaging device may further poll the space to determine if and when the occupant departs from the space. Identifying information may also be acquired through a user interface in which a user may enter identifying information, such as a credit card, a license number, a VIN, a driver's license, etc. The fact that the space has been occupied, the identifying information, and any prepaid amounts are transmitted via a communication device to a control station. The control station may monitor events in the space such that when an occupant departs the space, the timer is reset. Alternatively, the control station may issue fees for use of the space, may issue penalties or even call for removal of the occupant from the space if occupation of the space exceeds the amount of time purchased or poses an abuse of the privilege of using the space.
摘要:
A method to dynamically create an adaptive distribution list through an application of a combination of mathematical, logical and/or programmable operations to existing static distribution lists or user directories. This list is created as part of the information message sent to the entries on the distribution list. In this invention, the user or sender does not need to interface with the Group creation modification tool. Another feature of the invention is that the newly created distribution lists can be temporarily or permanently saved as designed by the sender. This invention eliminates the need to separately create distribution and then send messages to the entries on the distribution list.
摘要:
An apparatus, and a computer program are provided for securing transmitted text. Once text has been produced by an application, the potential exists for an unintended third party to obtain sensitive data transmitted over computer networks. However, a parsing function can then operate either on an individual computer or on a network to scan text at an Open Systems Interconnection (OSI) Layer 1 to assist in the prevention of sensitive data transmission. By utilizing the parsing function, text can be scanned for potentially sensitive data by using a variety of techniques, such as a learning algorithm. The sensitive data can then be verified by a user, bypassed, or autostripped.
摘要:
An apparatus, a method, and a computer program are provided for securing transmitted text. Once text has been produced by an application, the potential exists for an unintended third party to obtain sensitive data transmitted over computer networks. However, a parsing function can then operate either on an individual computer or on a network to scan text at an Open Systems Interconnection (OSI) Layer 1 to assist in the prevention of sensitive data transmission. By utilizing the parsing function, text can be scanned for potentially sensitive data by using a variety of techniques, such as a learning algorithm. The sensitive data can then be verified by a user, bypassed, or autostripped.
摘要:
A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information.
摘要:
Changes in wireless service user behavior are encouraged and produced to shape utilization patterns among cells within a rate plan region by using shaping rules which define potential discounts from a standard charge rate under certain cell-specific utilization conditions, analyzing the shaping rules and utilization statistics of a cell upon service initiation, generating a discount from the standard rate for underutilized cells. The user is notified of these discount opportunities using text messages, icons, or other means. Over time, the users learn that at certain places and times, significant discounts are offered, and thus changes their behavior to take advantage of those discounts, thereby shaping traffic in a manner desired by the service provider.
摘要:
The present invention provides for exchanging a gift card. Data associated with a first gift card is provided. The data associated with the first gift card is validated. With a money rebate associated with the first gift card, or a second gift card is selected. The first gift card is exchanged for either a money or the second gift card. An exchange fee is generated by both the vendor associated with the gift card and the company performing the exchange.
摘要:
A method for creating a read-only shopping token that is a digitally signed record of the contract between the buyer and the seller. The shopping token starts as an XML file containing the seller's personal information, information regarding the goods purchased, and the seller's terms for the transaction. The buyer adds his personal information to the XML file. The buyer and seller are both given an opportunity to review and modify the terms. When the buyer and seller agree to the terms, they both digitally sign the XML file. Once both the buyer and the seller have digitally signed the XML file, the XML file is converted into a shopping token. The shopping token is in a format such that a user cannot modify or copy-and-paste the subject matter of the shopping token. Any attempt to alter the shopping token renders the digital signatures invalid.