Abstract:
A bookmark set is created from search results. First, a search request from a client browser is sent for pages in a distributed database which satisfy a search condition. A set of pages which satisfy the search condition are returned. In the page which presents the search results, each page is associated with a user input sensitive selection means, such as a checkbox. Responsive to user input, i.e. selection of certain pages, a bookmark set comprised of a path to selected pages is created. The created bookmark set is served as a unit to the client browser.
Abstract:
Concurrently displaying a set of pages in a distributed database with a minimum of user interaction is disclosed. A set of bookmarked web pages in a browser interface are concurrently displaying a list of bookmarks in the interface, each bookmark associated with a respective one of the web pages. At least a subset of the web pages are displayed in a cascade of windows, each web page assigned to a respective window in the cascade in the order in which the associated bookmark is listed in the list of bookmarks. Each window in the cascade is arranged so that a title bar is visible and the alphanumeric content of the title bar can be easily related to an entry in the bookmark list.
Abstract:
A method of accessing files located in a computer system, by selecting a plurality of embedded links (such as hypertext links) from one or more pages displayed in a browser window, and processing the plurality of embedded links concurrently. The embedded links may include at least two embedded links from a single page displayed in the browser window, or may include at least one embedded link from a first page and at least one other embedded link from a second page. In one implementation, a pop-up menu is displayed once the links have all been selected, wherein the pop-up menu has a plurality of menu items associated with different types of link processing. The types of link processing include: concurrently displaying pages associated with the plurality of embedded links in a plurality of respective browser windows on the display; concurrently printing pages associated with the plurality of embedded links using a printing device of the computer system; or concurrently downloading pages associated with the plurality of embedded links, to a storage device of the computer system. Selection of the links may be facilitated by allowing the user to switch to a multi-link selection mode.
Abstract:
A method, system, and program for telephony based remote location monitoring are provided. A telephone network receives the caller request to listen only to a remote location telephony device. The telephone network allocates a listen only channel between the caller telephony device and the remote location telephony device. The telephone network activates a microphone at the remote location telephony device via the listen only channel. Then, audio detected at the microphone is streamed via the listen only channel to the caller telephony device, such that the telephone network enables a caller to monitor a remote location through the remote location telephony device with minimized allocation of telephone network resources.
Abstract:
A method, apparatus, and computer instructions for filtering and prioritizing instant messaging threaded conversations in an instant messaging system based on thread content. The instant messaging client analyzes an incoming message to determine the thread subject. Based on the thread subject analysis, the client determines the priority level associated with the incoming message. The message is then delivered and displayed to the recipient according to the priority level. The present invention also allows a participant initiating a thread of conversation to override filter settings on a messaging client. The authority to override settings may be predicated on an external list, such as a corporate telephone directory. As a result, the participant, having some authority or rights to override the recipient's instant messaging settings, may be allowed to conduct a messaging session with the recipient.
Abstract:
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
Abstract:
Methods, systems, and media for aggregating and processing product information are disclosed. Embodiments include hardware and/or software for receiving an electronic receipt from a merchant that describes a transaction for a product by a purchaser and gathering product information from one or more sources such as the merchant, the product's manufacturer, the purchaser's bank, and/or an accessories dealer. Upon gathering the product information, the product information is associated with the transaction for the product on the electronic receipt and packaged in a standard, electronic format, an aggregated package, that is accessible and manageable by the purchaser's software, such as a personal finance manager (PFM) like Quicken™, Quickbooks™, Microsoft Money™, or the like. The aggregated package can then be sent to the purchaser via an email address supplied by the purchaser at the time of the purchaser or by the purchaser's bank while completing a funds transfer for the transaction.
Abstract:
A system and method for automatically performing actions in response to a user making travel arrangements. Delivery services, such as postal and parcel services, are instructed to take certain actions while the user is traveling. For example, the delivery can be instructed to hold packages for pickup by the user, deliver the packages to the user when the user returns, or forward the packages to another location. In addition, a system and method for notifying a company mailroom with travel instructions is included. An electronic calendar is automatically updated with information related to the user's travel plans. Other users with access to the calendar can view the user's travel agenda. The user can gather travel specific details from the calendar for use in traveling, for example the flight and hotel information, is readily available. The user's telephone can also be configured as preferred by the user. Calls can be forwarded to the user's travel location, voice mail greetings can be updated to reflect the user's out-of-office status, and backup and emergency information can be updated. Destination information such as driving information, GPS data for use by GPS devices, medical services information, and civic, cultural, or attraction information can be downloaded to the user for use while at the destination.
Abstract:
A device scanner system at a security checkpoint queries a powered on electronic device for device-reported data via a network connection. The device-reported data includes the operational status of at least one component of the electronic device, a configuration of the electronic device, and a current ownership of the electronic device. Responsive to receiving the device-reported data, the device scanner system retrieves expected data for the electronic device. The device scanner system assigns a security level to the electronic device indicating whether the device-reported data matches the expected data, such that the electronic device is screened based on data reported by the powered on electronic device.
Abstract:
An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and method, a first party generates the secured communication connection object by setting parameters identifying and limiting the use of the secured communication connection object for establishing communication connections with the first party. These parameters are encapsulated with contact information for the first party such that the contact information is encrypted. The resulting secured communication connection object is then transmitted to a second party's communication device. When the second party wishes to establish a communication connection with the first party, the secured communication connection object is accessed in memory using information obtained from the object registry, the contact information is decrypted, and a communication unit is provided with the contact information for establishing a communication connection.