摘要:
An electronic coupon, an electronic commerce system, and a method for the honoring of electronic coupons utilizing computing equipment are disclosed. In the method, an issuing party issues an electronic coupon to a customer. The customer presents the coupon for redemption to a redemption party. The redemption party transmits the coupon to an authentication party for authentication. If authentic, the authentication party charges the redemption party a fee and passes that fee to the issuing party. The redemption party honors the coupon for the customer and seeking reimbursement of the fee from the issuing party. The electronic coupon has a plurality of data fields, including: a coupon identifier, x, a first one-way hash function field, f(x), and a secure signature field.
摘要:
A method and system generates, distributes, stores, redeems, validates and clears electronic manufacturer coupons and electronic store coupons. A coupon mint generates unforgable blank digital coupons. The promoter of the offer then writes the terms and conditions and other details of the offer, on blank coupons to customize these. These customized coupons are digitally signed by the promoter and distributed to potential customers. A customer may either present these coupons electronically for redemption to an online store, or print these coupons and present them to a conventional offline store. The store may check the authenticity of a coupon by verifying the digital signature and also verifying if the coupon has not been used earlier by contacting a verification center. The store collects all redeemed coupons and sends these to manufacturer for clearing. The verification center verifies that the coupon is authentic and has not already been used before.
摘要:
A methodology and system allows a plurality of reward scheme owners to give differential rewards, through a plurality of reward distribution agents, to various users based on the user profile. The reward scheme owner may be a seller, a manufacturer, a sales promotion agent or even an intermediary. Similarly, the reward distribution agent may be an on-line or a physical retailer, a broker, a seller or an intermediary. Also the users may be consumers, businesses, brokers or other intermediaries. In one specific case, a reward scheme owner defines a plurality of reward schemes, including at least one differential reward scheme giving different rewards to different users. The reward scheme owner communicates these to a central reward scheme database server. The reward scheme owners may or may not advertise these schemes. The user visits an online or a physical store. The store acting as a reward distribution agent dynamically profiles the user, queries the central reward scheme database server if the user profile meets the criterion for one or more rewards and offers the applicable rewards to the user. The store later receives reimbursement for the rewards offered to various users, from the reward scheme owners. This methodology and system may be used for offering targeted or differential discounts on different products and services, offering different promotional schemes on different combination of products, giving loyalty points, electronically distributing prizes, free samples, product warranties, tie-in promotions, cross selling, up selling, premiums, memberships, card discounts, organizing contests, sweepstakes, games and offering other similar rewards.
摘要:
A method and system for managing communications between sub-systems of a communication device. The sub-systems include a Radio Frequency Integrated Circuit (RFIC) and a Baseband Integrated Circuit (BBIC). The BBIC includes a processing engine, a state machine module and an interface module. The method includes initializing a Digital Radio Frequency Third Generation (DigRF3G) interface between the RFIC and the BBIC. The processing engine is kept functionally inactive during the initialization process of the DigRF3G interface. Further, the method includes exchanging one or more packets between the RFIC and the BBIC.
摘要:
A method for tuning performance of an operating system, the method comprising identifying all sources of operating system jitter; measuring the impact of each of the operating system jitter source; and tuning performance of the operating system, preferably by use of different approaches/techniques, which could include removing the sources of operating system jitter and/or delaying their execution and/or smoothening their execution over a longer period of time. Computer program code and systems are also provided.
摘要:
A method and system for managing communications between sub-systems of a communication device. The sub-systems include a Radio Frequency Integrated Circuit (RFIC) and a Baseband Integrated Circuit (BBIC). The BBIC includes a processing engine, a state machine module and an interface module. The method includes initializing a Digital Radio Frequency Third Generation (DigRF3G) interface between the RFIC and the BBIC. The processing engine is kept functionally inactive during the initialization process of the DigRF3G interface. Further, the method includes exchanging one or more packets between the RFIC and the BBIC.
摘要:
A system for receiving and handling a scrambled input data signal that includes a preamble with a start of frame delimiter (SFD) initiates an SFD search on the scrambled input data, thereby attempting to save an initialization period. The initialization period may be of the order of 7 uS, and its saving results in improved timeline management enabling antenna diversity and the possible use of high performance algorithms. The system may use two parallel paths for signal processing, each having an SFD detector and a descrambler. If the detected SFD is short, then the second path is disabled, and if it is long, then the first parallel path is disabled. Alternatively, the first path can be used for a finite period of time (for e.g., 40 symbols) and if the SFD is still not detected, the first path is disabled, and the system uses only the second path.
摘要:
A method, apparatus and computer program product are disclosed for incrementally checkpointing the state of a computer memory in the presence of at least one executing software application at periodic instants. A secure hash function is periodically applied to each partitioned contiguous block of memory to give a periodic block hash value. At each periodic instant, a block hash value for each block is compared with a respective preceding block hash value to determine if said memory block has changed according to whether said block hash values are different. Only changed memory blocks are stored in a checkpoint record. The memory block sizes are adapted at each periodic instant to split changed blocks into at least two parts and to merge only two non-changed contiguous blocks at a time.
摘要:
A novel technique for combining deinterleaving operation with post FFT modules in a receiver to reduce processing time. In one example embodiment, the deinterleaving operation, in the post FFT module, is combined with FFT and demapper operations to reduce the processing time and complexity.
摘要:
A method for designing a decision feedback equalizer (DFE) that handles packet based input data signals uses an inter symbol interference (ISI) removal loop and an inter chip interference (ICI) removal loop which is nested inside the ISI loop, for maximum interference removal and limited error propagation. The DFE may use a feed forward filter and a series connected chip-flow control buffer for receiving the input data signals. The DFE of the invention has application in 802.11 b PHY and 802.11 g PHY scenarios and any application involving a DFE with the need for minimum error propagation. Taught herein is a combined weighted DFE with erasure provision and interference removal in an optional two step mechanism. An article comprising a computer storage medium to execute the DFE design method is also disclosed.