摘要:
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user.
摘要:
Workload requests are routed in response to server greenness conditions. A workload request is received for a remotely invocable computing service executing separately in different remotely and geographically dispersed host computing servers. Greenness conditions pertaining to production or conservation of energy based upon external factors for each of the different remotely and geographically dispersed host computing servers are determined. The workload request is routed to one of the different remotely and geographically dispersed host computing servers based upon the determined greenness conditions.
摘要:
A multi-tier ASP delivery system. The system can include a host computing device configured to communicate both with a computer communications network and with a plurality of wireless devices in a personal area network (PAN). In particular, a short-range radio communications system can be provided with which wireless communications in the PAN can be established and maintained. A list of ASP services further can be provided which indicates those ASP services which can be accessed by the wireless devices in the PAN. The ASP services in the list can reside locally in the host computing device and remotely in ASP servers in the computer communications network.
摘要:
A method is disclosed to provide delayed responses to messages. The method includes receiving in a computer, an email message containing a control character, from a network. The control character specifying a reply prohibiting period during which a reply to the email message over the network will be prohibited. The method then includes receiving in the computer, a user request at a requesting instant to reply to the email message. The method then includes determining whether the requesting instant occurs during the reply prohibiting period specified by the control character. The method then includes prohibiting a reply to the email message over the network if the requesting instant occurs during the reply prohibiting period. And finally, the method then includes allowing a reply to the email message over the network if the requesting instant does not occur during the reply prohibiting period.
摘要:
A method for delivering electronic services in a personal area network (PAN) can include providing a kiosk in a publicly traversable area. The kiosk can be configured to deliver electronic services over short-range radio communications links to wireless devices in a personal area network (PAN). The kiosk also can be configured to communicate over an existing physical communications link medium. A PAN can be established in the publicly traversable area. Electronic services can be selectably retrieved through the existing physical communications link medium into the kiosk. Finally, the retrieved selected electronic services can be delivered to wireless devices in the PAN over the short-range radio communications link. Notably, the step of establishing a PAN in the publicly traversable area can include establishing a BLUETOOTH-based PAN with wireless devices in the publicly traversable area. In addition, the step of providing a kiosk first can include retrofitting an existing kiosk both with a short-range radio frequency communications system, and with a host computing device for selectively retrieving electronic services over the existing physical communications link medium, and for delivering selected electronic services to the wireless devices in the PAN. Second, the retrofitted kiosk can be activated in the publicly traversable area.
摘要:
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.
摘要:
A security system and methodology are provided employing a process that determines whether to use an image and/or other inputs received from at least one remote input node. In one illustrative embodiment, the invention comprises a system and method for using image input in conjunction with wireless transmission to increase personal safety.
摘要:
A method of transferring data includes reception of a message from a first mobile device operated by a user, storage of the message according to a location of the first mobile device, reception of an indication that a second mobile device operated by a second user is located proximate to the location, and transmission of the message to the second mobile device.
摘要:
Systems and methods are provided to facilitate a distribution of information. According to one embodiment, vehicle control information is determined, the vehicle control information being dependent on time in formation, operator information, and/or vehicle information. For example, an intersection control signal may be determined. The vehicle control information is then transmitted to an automobile device, which in turn arranges for the vehicle control information to be provided to an operator. For example, a graphical representation of an intersection control signal may be displayed on an automobile's windshield.
摘要:
A simplified TV viewer response system coupled to a telephone system enables a viewer/subscriber to respond to television displays by dialing a special code less than six digits. The code is routed to an enhanced services server. The server captures the dial string including the caller ID, checks the caller ID against a subscriber/viewer profile and maps the caller ID to the cable company providing service to the viewer/subscriber. The server delivers the response to the cable television company which processes the response according to the selected items or choices in the TV screen. Several special dialing codes of limited digits expedite viewer/subscriber selections. Each code includes a special character to route the dialing string to the server. The system provides sound recognition of viewer/subscriber selections.