摘要:
A rules driven multiple passwords system is provided wherein a list of stored passwords are used in rotation over time in accordance with a set of rules or conditions managed by the system. With such an arrangement, the currently active password of a system User may automatically be changed, in accordance with the rules or conditions, to the next password in the list. The User is notified as to the newly assigned password.
摘要:
A system and method of determining likelihood of counterfeiting without inspection of currency compares signals returned by uniquely customized RFID chips when interrogated, preferably incident to a transaction. The RFID information is compared to RFID information for bills known to be in circulation in order to validate a given currency bill. Usage patterns can be determined from statistical analysis of such reports and reported usage patterns will statistically differ significantly if not radically with the number of RFID chips returning the same RFID information and such differences will increase in either or both of geographic locations of reports and frequency of reports with increase of the number of bills having duplicated RFID chips. The basic infrastructure for practice of the invention is also capable of tracking genuine currency following, for example, a theft or other criminal activity.
摘要:
A method of implementing dynamic pseudorandom keyboard remapping of a system including a keyboard in communication with an operating system of a computing device includes encrypting an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and decrypting the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard to the operating, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.
摘要:
A system for implementing dynamic pseudorandom keyboard remapping includes a keyboard in communication with an operating system of a computing device; the keyboard configured to encrypt an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and the operating system configured to decrypt the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard thereto, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.
摘要:
A method for securing personal computing devices from unauthorized data copying and removal includes detecting an attachment of a device to a client included within a computing network; determining whether the detected attached device is permitted to be attached to the client; prompting a user of the client to remove the attached device therefrom in the event the detected attached device is not permitted to be attached to the client; and loading a replacement device driver onto the client in the event the attached device has not been removed, wherein the replacement device driver prevents the client from copying data to the attached device.
摘要:
Copy protected materials are backed up or restored and made available for play on electronic media players through an online retrievable system. Corrupted segments of electronic media storage files are identified and located prior to being read, executed, or played. An uncorrupted copy from the network is then located, and software instructions provide for the storage of the uncorrupted segment of the file on electronic media player, merging the uncorrupted segment into the reading, executing, or playing of the electronic storage media file to seamlessly produce an output in real-time that is indistinguishable from the uncorrupted file.
摘要:
A method for collaborative teaching and learning, while facilitating simultaneous and dynamic changes by multiple users, includes: receiving a command to add or modify an existing topic record in a series of topic records in response to a user request; creating a new record in the event the received command is to add a new topic record; generating a modify token in the event the received command is to modify an existing topic record; deleting the modify token in response to completion of modifying the existing topic record; wherein the modify token prevents additional users from editing the existing topic record, but allows for the existing record to copied and modified while the first user is modifying the existing topic record; and wherein a collaboration engine generates and manages the modify token.
摘要:
An exemplary embodiment of the invention relates to a method, system, and storage medium for providing web-based electronic research and presentation functions via a document creation application. The method includes scanning an active document on a computer to identify relevant keywords, searching a database for reference materials relating to the relevant keywords, and displaying relevant reference materials on the computer. The method further includes deploying process software for providing the web-based electronic research and presentation functions via a document creation application. The deployment includes installing the process software on a server, identifying server addresses for users accessing the process software on the server, sending the process software to the server and copying the process software to a file system of the server. The deployment also includes sending the process software to a client computer and executing the process software on the client computer.
摘要:
A system and method for collecting and storing communications preferences of recipients and delivering communications to a recipient in accordance with the recipient's preferences is disclosed herein. Preferably, the communications preferences consist of at least one mail formatting preference and at least one sending preference. The system automatically formats a message in accordance with the intended recipient's communications preferences stored in a profile table. In an alternative embodiment, the system provides for a prompting function that can alter the communications preferences in the event that a particular preference must be changed. This prompting function is also useful if recipient does not have a corresponding profile in the profile table.
摘要:
A method for providing deep linking activities with digital rights management. In an exemplary embodiment, the method includes identifying a hypertext link on a source web page as a deep link and, upon selecting the deep link, accessing a deep link table associated with the deep link. The hypertext link refers to a target web page on a target web site. The deep link table contains web page links and rules operable for establishing web content that is to be presented to a visitor of the target web site. The method also includes displaying web content to the visitor in accordance with the rules. The invention also includes a system and a storage medium.