Abstract:
An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and method, a first party generates the secured communication connection object by setting parameters identifying and limiting the use of the secured communication connection object for establishing communication connections with the first party. These parameters are encapsulated with contact information for the first party such that the contact information is encrypted. The resulting secured communication connection object is then transmitted to a second party's communication device. When the second party wishes to establish a communication connection with the first party, the secured communication connection object is accessed in memory using information obtained from the object registry, the contact information is decrypted, and a communication unit is provided with the contact information for establishing a communication connection.
Abstract:
Provided is a method for generating and updating screenshots within computer software documentation. The disclosed techniques enable software documentation to insert up-to-date screenshots either upon installation of the corresponding software, dynamically when the documentation is used, or in some combination of the two approaches. In one embodiment, the computing system or application detects when screenshots have been modified and regenerates screenshots within affected documentation. Documentation is created that includes text and macros. The macros provide for the inclusion of screenshots within the documentation. Each macro includes information about where an associated screenshot is to be captured, the steps necessary to capture the screenshot and the location within the documentation where the screenshot is displayed. Also included in association with the macros is configuration information necessary to generate the appropriate screenshot.
Abstract:
An improved electronic whiteboard is provided. The improved electronic whiteboard includes a plurality of toggle switches along a vertical side for drawing vertical straight lines across the electronic whiteboard and a plurality of toggle switches along a horizontal side for drawing horizontal straight lines across the electronic whiteboard. When some or all the switches along the vertical side are turned on, vertical straight lines are drawn across the electronic whiteboard. Likewise, when some or all the switches along the horizontal side are turned on, horizontal straight lines are drawn across the electronic whiteboard. The intersections of the vertical straight lines with the horizontal straight lines form a plurality of grid cells. The electronic whiteboard contains means for determining the location of these cells.
Abstract:
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
Abstract:
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
Abstract:
A method, system, and computer-usable medium for sending a first notification message to a credit card agency alerting the credit card agency of a misplaced credit card, an identification of a credit card owner, and a location of the misplaced credit card; in response to receiving the first notification message, sending a second notification message to the credit card owner corresponding to the misplaced credit card; and in response to receiving the second notification message, specifying a procedure for returning the misplaced credit card to the credit card owner.
Abstract:
The present invention is directed to a method and system for altering an administrator of a multi-way call during the multi-way call connection and transferring the associated charges from one administrator to another. After a multi-way call connection is established from the originating party to many participating parties, the originating party may be given an opportunity to shift an administrator role to one of the participating parties. The participating party designated to be a new administrator may accept or refuse the request from the originating party. Once the participating party accepts the new administrator role, the subsequent charges may be transferred to the participating party and the originating party may be able to continue in or to drop out from the multi-way call without further responsibility of charges.
Abstract:
Provided is a method for controlling a media device such that a user can define specific events as interruptions and automatically change the channel when one of these events is detected. The media control device (MCD) is configurable, both respect to the type of event that is considered an interruption and the alternate channel(s) to which the media device is changed. Once the interrupt has concluded, the MCD changes the radio back to the original station. In the alternative, during an interruption the MCD may simply replace the interrupted channel with a stream from another device. Introduction of a short time delay between the reception of a media signal and the presentation of the signal to a user enables the MCD to execute the described functions in a manner that appears seamless to the user.
Abstract:
Embodiments include hardware and/or software for receiving an electronic receipt from a merchant that describes a transaction for a product by a purchaser and gathering product information from one or more sources such as the merchant, the product's manufacturer, the purchaser's bank, and/or an accessories dealer. Upon gathering the product information, the product information is associated with the transaction for the product on the electronic receipt and packaged in a standard, electronic format, an aggregated package, that is accessible and manageable by the purchaser's software, such as a personal finance manager (PFM) like Quicken™, Quickbooks™, Microsoft Money™, or the like. The aggregated package can then be sent to the purchaser via an email address supplied by the purchaser at the time of the purchaser or by the purchaser's bank while completing a funds transfer for the transaction.
Abstract:
The present invention is a method for providing telephone service. The method includes receiving a request at a first telephone from a second telephone to access the first telephone's telephone service in response to the second telephone's inability to access the second telephone's telephone service. The method further includes granting access to the first telephone's telephone service for use by the second telephone in response to receiving the request at the first telephone prompting the first telephone to grant access to the first telephone's telephone service. The request is received by the first telephone from the second telephone via a short-range wireless connection.