摘要:
A method, system and computer-readable medium for defeating clickbots are presented. In a preferred embodiment, the method includes, but is not limited to, the steps of: detecting a click on a Pay Per Click (PPC) link on a first webpage; in response to detecting the click on the PPC link, presenting a confirmation webpage, wherein the confirmation webpage comprises a confirmation button that is positioned at a random position on the confirmation webpage; and in response to detecting a click of the confirmation button, directing a user to a second webpage that is associated with the PPC link
摘要:
The behavior of a messaging system can be modified. A message from a sender can be received. A determination can be made that the message is associated with a workflow. A position of the sender within an organizational hierarchy can be identified. The workflow associated with the message can be initiated according to the position of the sender.
摘要:
A system and method of conducting commercial activities such as an auction in a rather localized area (such as a shopping mall). Potential consumers located in the local area have a mobile wireless communications device (for example, a smart cellular phone or a 2-way radio or a Bluetooth communication device) including a set of stored instructions allowing the device to be programmed with a set of desired transactions and preferences such as the brands or transaction types which the consumer prefers. Merchants are connected to receive a communication from the communications device and respond to the desired transaction and preferences by proposing goods or services at specific terms such as price. The mobile wireless communications device associated with the potential consumer has the potential to receive communications from merchants (either directly or through an intermediate system) and to transmit a communication back to the merchant indicating the potential offer so that a merchant can revise or improve the offer. In this way, local merchants can be aware of the offers that a consumer receives and can improve on those offers to secure the potential consumer's business. While the actual transaction may be conducted in person at the merchant, one can envision a system where the transaction is completed through the wireless communication system with the payment occurring through charge or other electronic transaction and the delivery of the goods or service through conventional delivery channels.
摘要:
Systems and methods are provided to monitor a container associated with an item. According to one embodiment, an indication that a container has been opened is received. For example, the container may transmit a signal when a person opens the container to access an item. Based on the received indication, ownership of the item may be transferred and/or another item may be provided (e.g., to the person who opened the container). According to other embodiments, item quality information, item warranty information, and/or security information are determined based on the received indication. According to still other embodiments, a sender receives a notification based on the indication or the indication is recorded as an acceptance of an agreement. In yet another embodiment, the indication is used to verify that the container was opened in accordance with an item requirement.
摘要:
A method for providing privately viewable data in a publically viewable display comprises the steps of: generating a sequencing pattern; generating a data signal having interspersed frames of private data among frames of masking data according to the sequencing pattern; providing the data signal to the publically viewable display; and, opening and closing shutters in a set of active glasses in accordance with the sequencing pattern. In one embodiment, the sequencing pattern can correspond to alternating displays of the private data and the masking data. In an alternative embodiment, the sequencing pattern can correspond to combined left eye/right eye images of the private data. In the preferred embodiment, the masking data can be a fill pattern, for example, random data or a screen saver image. However, in another embodiment, the masking data can be a derivation of the private data. The step of opening and closing the shutters can comprise the step of responsive to sync pulses in the sequencing pattern, opening and closing the shutters. In consequence of the inventive method, a user viewing the display with the active glasses can view the private data and unauthorized viewers without the active glasses can view only the private data obscured by the masking data.
摘要:
In a search engine server, a method for searching for data in a data network comprising hyperlinked pages comprising the steps of (1) receiving an initial set of network addresses for pages in the data network; (2) receiving a non-negative integer, N, specifying a chain length; (3) receiving a set of at least one search argument comprising search criteria; and (4) performing a search wherein all pages linked to said initial set of addresses by a chain of distance less than or equal to N are examined for compliance with the search criteria, and all pages meeting such criteria are returned as successful objects of the search. According to optional embodiments, the foregoing method can be implemented as a computer readable medium with instructions for performing the above steps, as an application program, or a browser resident at an end user's computer system. It is also possible to implement as a special purpose information handling system.
摘要:
A method for searching for data in a data network comprising hyperlinked pages comprising the steps of (1) receiving an initial set of network addresses for pages in the data network; (2) receiving a non-negative integer, N, specifying a chain length; (3) receiving a set of at least one search argument comprising search criteria; and (4) performing a search wherein all pages linked to said initial set of addresses by a chain of distance less than or equal to N are examined for compliance with the search criteria, and all pages meeting such criteria are returned as successful objects of the search. According to optional embodiments, the foregoing method can be implemented as a computer readable medium with instructions for performing the above steps, as an application program, or a browser resident at an end user's computer system. It is also possible to implement as a special purpose information handling system.
摘要:
The state of network-accessible information is preserved by recognizing a reference to a uniform resource locator contained within an electronic file where the uniform resource locator provides an address for content to be preserved. A copy of at least a portion of the information associated with the recognized uniform resource locator is obtained defining relevant content for preservation. A determination is also made as to whether the relevant content of the recognized uniform resource locator has changed since obtaining the copy of the relevant content. If a change is detected, an indication of the change is conveyed, e.g., to a corresponding user.
摘要:
A user inspects at least one indicator of an event. The user enables a token corresponding to an account of an aggregating entity to be received by a transaction entity and identifies at least one type of event of interest to be reported by the transaction entity to the aggregating entity. The user obtains and inspects at least one indicator from the account of the aggregating entity, where each obtained indicator is adapted to be created by the aggregating entity based upon an event message received from the transaction entity. The event message comprises the token, which is adapted to be used by the aggregating entity to identify the account and the event message corresponds to an occurrence of an event of at least one type of event of interest to be reported by the transaction entity to the aggregating entity.
摘要:
Provided are techniques for providing annotations for revising a message. A message to be sent from a sender to a recipient is received. A meaning map associated with the sender and a meaning map associated with the recipient are obtained. The message is parsed into sub-constructs. The sub-constructs are compared in the meaning map associated with the sender and the meaning map associated with the recipient. Alternative language for the sub-constructs is identified. Annotations are provided based on the alternative language.