Abstract:
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
Abstract:
A method, computer program product and system that may be used to limit the funds that are available through the use of a business transaction card by having a business transaction card first place a request for an increase of the available funds. A wireless device is sensed within a proximity to a terminal that supports wireless communication and communication between the wireless device and the terminal is established for transferring an identification code from the wireless device to the terminal. The terminal is communicatively connected to a server and the terminal automatically transfers the identification code from the terminal to the server. The server matches the identification code with an account number of the business transaction card and, if authorization exists, automatically increases the funds available balance of the business transaction card.
Abstract:
A method, program, and system for processing electronic receipts within a computer network are provided. The present invention comprises creating a customer profile for a user using a Smart Receipt application. When the user purchases items, electronic receipts (smart receipts) are sent from the point of sale to a designated database. The database may be on a credit card company server, the product manufacturer's server, a special cash receipts server, or a central clearing house server. When the customer wants a copy of a receipt, he or she enters search parameters which specify the desired receipt. The search parameters may include item type, date of purchase, and method of purchase. A Smart Receipt object is then initiated, which retrieves the specified electronic receipt from the appropriate database, according to the search parameters. A copy of the retrieved electronic receipt is then downloaded to a client machine (e.g. PDA, PC) designated by the customer profile.
Abstract:
Provided is a system which takes advantage of the integrated capabilities of different communication devices and employs those capabilities so that participation in any particular conference call is more tightly controlled than possible with current systems. A “vInvitation” programming object is defined that establishes parameters for a particular conference call. A conference call coordinator sends a vInvitation object to each prospective participant of a particular conference call. Each vInvitation is attached to a vCalendar programming object, which includes information related to the scheduling of the conference call. When activated by a receiving device, the vCalendar object automatically enters information about the particular conference call into a prospective participant's electronic calendar. At the appropriate time, the vCalendar object is activated, which in turn activates the vInvitation object. The vInvitation object establishes the corresponding participant's connection to the conference call, maintaining the secrecy of pass code and access number.
Abstract:
A method in a user computing device for presenting dialogs in a set of computing devices including the user computing device. Responsive to a request to present a dialog, computing devices within the set of computing devices in a selected proximity of the user computing device are identified to form a set of proximate computing devices. The dialog is presented on only one of the user computer device and the set of proximate computing devices based on a policy.
Abstract:
A system and method are disclosed that regulate browsing of web content or content labels and that provide selective and multiple programmed settings and passwords for web content labels. In one embodiment, at least some of the web pages accessible to a web browser are assigned content labels. Programmed settings are established for the content labels that are to be password protected. A content password is assigned to each of the programmed settings. Access to web pages without any content labels is strictly denied by the web browser. Access to web pages with content labels that are not being regulated is allowed. Access to web pages with content labels that are password protected is regulated.
Abstract:
A system and method for notifying a user of urgent phone messages is provided. When a telephone or text message is received by the phone answering system, a priority is determined for the message. If the telephone call is identified as an urgent telephone call, the system repeatedly dials the subscriber's phone in order to notify the user of the urgent message. In one embodiment, multiple locations, such as pagers, email addresses, and alternate phone numbers are contacted in order to inform the user of the urgent message. When the user is contacted, the urgent messages are played for the user. In a mobile telephone system environment, determinations are made as to whether the user is operating in roam mode before messages are delivered. A caller id function can further be included to selectively allow messages to be identified as urgent based upon the identification of the caller.
Abstract:
Upon creation of an event or activity entry within a calendar, the user is prompted to specify a power management mode to associate with the entry if the entry is not of a predefined type. Predefined entry types may be associated with default power management modes which the user may modify. When an event or activity entry associated with a non-null power management mode is reached, the calendar sends a power management event notification to the power manager, which responds appropriately. Thus, a user may specify that the system, if powered on, should automatically shut down for the duration of a planned vacation identified by an entry within the calendar. The system may thus distinguish between events during which the user is unavailable (e.g., on a business trip or at a remote meeting) from events during which the user is available but perhaps not actively using the system for a period. The calendar event power management modes complement and refine the preconfigured system power management schemes to take into account the user's schedule of activities.
Abstract:
A method and apparatus in a data processing system for selectively caching web information in a cache for a browser. Web content is first retrieved by the browser during a browsing session. The web content is parsed for an indication of how the page should be stored. The web content is then stored using the indication. For example, retrieved web content may be parsed for an indication that the web content is to be removed after the browsing session terminates. Responsive to identifying the indication, the web content is cleared from the cache in response to the browsing session terminating.
Abstract:
A method and apparatus for maintaining a client computer. An image of a selected client computer is created. The image of the selected client computer is placed on another computer. Maintenance is performed on the image on the another computer, wherein an updated image is created. The updated image is sent back to the client computer, wherein maintenance is performed.