Abstract:
Methods, systems, and media for aggregating and processing product information are disclosed. Embodiments include hardware and/or software for receiving an electronic receipt from a merchant that describes a transaction for a product by a purchaser and gathering product information from one or more sources such as the merchant, the product's manufacturer, the purchaser's bank, and/or an accessories dealer. Upon gathering the product information, the product information is associated with the transaction for the product on the electronic receipt and packaged in a standard, electronic format, an aggregated package, that is accessible and manageable by the purchaser's software, such as a personal finance manager (PFM) like Quicken™, Quickbooks™, Microsoft Money™, or the like. The aggregated package can then be sent to the purchaser via an email address supplied by the purchaser at the time of the purchaser or by the purchaser's bank while completing a funds transfer for the transaction.
Abstract:
A system and method for automatically performing actions in response to a user making travel arrangements. Delivery services, such as postal and parcel services, are instructed to take certain actions while the user is traveling. For example, the delivery can be instructed to hold packages for pickup by the user, deliver the packages to the user when the user returns, or forward the packages to another location. In addition, a system and method for notifying a company mailroom with travel instructions is included. An electronic calendar is automatically updated with information related to the user's travel plans. Other users with access to the calendar can view the user's travel agenda. The user can gather travel specific details from the calendar for use in traveling, for example the flight and hotel information, is readily available. The user's telephone can also be configured as preferred by the user. Calls can be forwarded to the user's travel location, voice mail greetings can be updated to reflect the user's out-of-office status, and backup and emergency information can be updated. Destination information such as driving information, GPS data for use by GPS devices, medical services information, and civic, cultural, or attraction information can be downloaded to the user for use while at the destination.
Abstract:
A device scanner system at a security checkpoint queries a powered on electronic device for device-reported data via a network connection. The device-reported data includes the operational status of at least one component of the electronic device, a configuration of the electronic device, and a current ownership of the electronic device. Responsive to receiving the device-reported data, the device scanner system retrieves expected data for the electronic device. The device scanner system assigns a security level to the electronic device indicating whether the device-reported data matches the expected data, such that the electronic device is screened based on data reported by the powered on electronic device.
Abstract:
An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and method, a first party generates the secured communication connection object by setting parameters identifying and limiting the use of the secured communication connection object for establishing communication connections with the first party. These parameters are encapsulated with contact information for the first party such that the contact information is encrypted. The resulting secured communication connection object is then transmitted to a second party's communication device. When the second party wishes to establish a communication connection with the first party, the secured communication connection object is accessed in memory using information obtained from the object registry, the contact information is decrypted, and a communication unit is provided with the contact information for establishing a communication connection.
Abstract:
Provided is a method for generating and updating screenshots within computer software documentation. The disclosed techniques enable software documentation to insert up-to-date screenshots either upon installation of the corresponding software, dynamically when the documentation is used, or in some combination of the two approaches. In one embodiment, the computing system or application detects when screenshots have been modified and regenerates screenshots within affected documentation. Documentation is created that includes text and macros. The macros provide for the inclusion of screenshots within the documentation. Each macro includes information about where an associated screenshot is to be captured, the steps necessary to capture the screenshot and the location within the documentation where the screenshot is displayed. Also included in association with the macros is configuration information necessary to generate the appropriate screenshot.
Abstract:
An improved electronic whiteboard is provided. The improved electronic whiteboard includes a plurality of toggle switches along a vertical side for drawing vertical straight lines across the electronic whiteboard and a plurality of toggle switches along a horizontal side for drawing horizontal straight lines across the electronic whiteboard. When some or all the switches along the vertical side are turned on, vertical straight lines are drawn across the electronic whiteboard. Likewise, when some or all the switches along the horizontal side are turned on, horizontal straight lines are drawn across the electronic whiteboard. The intersections of the vertical straight lines with the horizontal straight lines form a plurality of grid cells. The electronic whiteboard contains means for determining the location of these cells.
Abstract:
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
Abstract:
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
Abstract:
A method, system, and computer-usable medium for sending a first notification message to a credit card agency alerting the credit card agency of a misplaced credit card, an identification of a credit card owner, and a location of the misplaced credit card; in response to receiving the first notification message, sending a second notification message to the credit card owner corresponding to the misplaced credit card; and in response to receiving the second notification message, specifying a procedure for returning the misplaced credit card to the credit card owner.
Abstract:
The present invention is directed to a method and system for altering an administrator of a multi-way call during the multi-way call connection and transferring the associated charges from one administrator to another. After a multi-way call connection is established from the originating party to many participating parties, the originating party may be given an opportunity to shift an administrator role to one of the participating parties. The participating party designated to be a new administrator may accept or refuse the request from the originating party. Once the participating party accepts the new administrator role, the subsequent charges may be transferred to the participating party and the originating party may be able to continue in or to drop out from the multi-way call without further responsibility of charges.