Abstract:
Provided is a method for controlling a media device such that a user can define specific events as interruptions and automatically change the channel when one of these events is detected. The media control device (MCD) is configurable, both respect to the type of event that is considered an interruption and the alternate channel(s) to which the media device is changed. Once the interrupt has concluded, the MCD changes the radio back to the original station. In the alternative, during an interruption the MCD may simply replace the interrupted channel with a stream from another device. Introduction of a short time delay between the reception of a media signal and the presentation of the signal to a user enables the MCD to execute the described functions in a manner that appears seamless to the user.
Abstract:
Embodiments include hardware and/or software for receiving an electronic receipt from a merchant that describes a transaction for a product by a purchaser and gathering product information from one or more sources such as the merchant, the product's manufacturer, the purchaser's bank, and/or an accessories dealer. Upon gathering the product information, the product information is associated with the transaction for the product on the electronic receipt and packaged in a standard, electronic format, an aggregated package, that is accessible and manageable by the purchaser's software, such as a personal finance manager (PFM) like Quicken™, Quickbooks™, Microsoft Money™, or the like. The aggregated package can then be sent to the purchaser via an email address supplied by the purchaser at the time of the purchaser or by the purchaser's bank while completing a funds transfer for the transaction.
Abstract:
The present invention is a method for providing telephone service. The method includes receiving a request at a first telephone from a second telephone to access the first telephone's telephone service in response to the second telephone's inability to access the second telephone's telephone service. The method further includes granting access to the first telephone's telephone service for use by the second telephone in response to receiving the request at the first telephone prompting the first telephone to grant access to the first telephone's telephone service. The request is received by the first telephone from the second telephone via a short-range wireless connection.
Abstract:
Methods 400 are provided for using RFIDs to aid in creating and documenting electronic e-mail communications. A communication device such as a computer system 200 capable of sending e-mail is configured with an RFID reader 215. When a user is composing an e-mail to send and the computer system 200 detects an RFID identity tag 120 of the user, an authentication content is attached to the e-mail. The authentication content attached to the e-mail helps to authenticate the identity of the user to the person receiving the e-mail.
Abstract:
A system for providing credit card sub-accounts with varying credit limits is useful to consolidate many accounts into one account. The present invention allows a user to add others to an existing account with the safety of setting credit limits for each sub-account to prevent sub-account holders from abusing the user's account features, funds, credit limits, and the like. Credit limits for sub-accounts can be configured by an exact amount, a percentage of the total credit limit, a percentage of the credit available, or a combination of these methods, and can also be per transaction, type of establishment where transaction takes place, or types of products or services attempting to be purchased.
Abstract:
Provided is a method that enables a media subscriber to pay for and send pay-per-view media content to a third party. The subscriber is billed for the content in a normal fashion. The viewer selects a specific program that is scheduled for transmission and provides information about the identity of the other subscriber, or the recipient, so that the content can be delivered to the recipient. Additional information may include a reason for sending the program and an additional message. The recipient receives notification that the programming has been purchased on his or her behalf and is given the option of accepting or declining the program. If the recipient accepts the program, the recipient may specify a date and time for viewing or specify that the programming be recorded.
Abstract:
Methods 400 are provided for using RFIDs to aid in creating and documenting electronic e-mail communications. A communication device 101 capable of sending e-mail is configured with an RFID transmitter and detector, or RFID transceiver. When the device is in the presence of other devices, the user may choose to capture the e-mail addresses of the other device using the RFID detection capability. Each device has an RFID associated with an e-mail address. By detecting the other RFID devices, the user may automatically capture their associated e-mail addresses.
Abstract:
Methods, computer program products and systems for updating a dictionary on a computer are provided including identifying a set of words included with an application program being installed on the computer and identifying one or more installed dictionaries within the computer. The dictionaries that are identified, typically by searching the computer for installed dictionaries, may then be updated by adding one or more words of the set to at least one of the installed dictionaries. Optionally, one or more installed dictionaries may be identified by the user responding to a query asking the user to identify dictionaries or applications that contain dictionaries installed on the computer. An application programming interface may add the words to the dictionaries by associating the installed dictionaries with one or more installed application programs and identifying an API that is specific for the application and using the API to update the dictionaries.
Abstract:
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
Abstract:
A method and system for hibernating the state of executing applications on a removable module and resuming the applications at later time using the saved applications' state. After inserting the removable module into a computer system, the applications' state information stored on the removable module is loaded. The application state information may include an application identifier, a file identifier of a file being accessed by the application, and user preferences related to the application. One or more software applications are loaded from a nonvolatile storage device accessible by the computer system to a memory accessible by the computer system, and the loaded applications are executed. The state of each of the executed software applications is set based upon the corresponding application state information.