摘要:
A system and method for detecting click fraud where data related to at least one vector associated with a path taken by movement of a cursor on a web page prior to an advertisement on the web page being clicked by a controller of the cursor is received. Click fraud is detected based on an analysis of the received data. A pattern in the at least one vector is analyzed to determine if the cursor movement is human-like and a click fraud detected if the cursor movement is not human-like. In another embodiment, the at least one vector associated with the path is stored and compared with previously stored vectors associated with the path and a click fraud detected if the stored at least one vector is analogous to at least one of the previously stored vectors associated with the path.
摘要:
A method, device and computer program product for multiple identity recognition includes receiving a first communication from a sender addressed to a recipient using a first identity. A determination may be made as to whether the sender has multiple identities, and in response to determining that the sender has multiple identities, information regarding the identities of the sender is retrieved. The identities of the sender may be associated together so that the recipient may be provided an indication that the sender has at least one identity other than the first identity.
摘要:
An event scheduling request is received, and a disruption factor is associated with each of a plurality of invitees. The disruption factor is based upon, at least in part, an event parameter and at least one invitee attribute. An event is scheduled based upon, at least in part, the disruption factors associated with each of the plurality of invitees.
摘要:
A method includes receiving an indication of an elapsed time since a scheduled teleconference meeting start and a further indication of current attendance at the teleconference; applying at least one rule for determining, based on the indications, whether to issue a notification to an absent invitee of the teleconference; and in response to application of the rule, selectively issuing the notification to the absent invitee.
摘要:
Methods, systems, computer program products, and methods of doing business by selectably mixing one or more sound files with a telephone caller's voice message, either as background for that message or embedded within the message. Or, the mixing may occur within a telephone conversation between parties. The disclosed techniques enable alleviating some of the problems that result from distance communication (as contrasted to face-to-face communication). In particular, context information (such as emotional context) can be provided through appropriate use of background sound and/or embedded audio files. The disclosed techniques may also make communication through voice mail exchange more enjoyable and/or increase its productivity.
摘要:
A method for providing configurable access to media in a media-on-demand system also can include delivering the media to a first client device in a format compatible with the first client device; interrupting the delivery of the media; recording a bookmark specifying a position in the media where the interruption occurred; and resuming delivery of the media to a second client device, the resumed delivery beginning at a position in the media specified by the recorded bookmark. The method further can include identifying device properties for each of the first and second client devices; delivering the media to the first client device in a format compatible with the identified device properties for the first client device; and, delivering the media to the second client device in a format compatible with the identified device properties for the second client device.
摘要:
A method of federating electronic mail (e-mail). A request can be received from a first user to view at least one e-mail of a second user, the request including at least one identifier corresponding to the second user and a criteria indicating a subject matter of the e-mail. The method further can include verifying whether the first user is authorized to access the e-mail of the second user that satisfies the criteria. Responsive to determining that the first user is authorized to view the e-mail of the second user that satisfies the criteria, the first user can be provided access to view the at least one e-mail that satisfies the criteria.
摘要:
A security system and methodology are provided employing a process that determines whether to use an image and/or other inputs received from at least one remote input node. In one illustrative embodiment, the invention comprises a system and method for using image input in conjunction with wireless transmission to increase personal safety.
摘要:
Methods, systems, computer program products, and methods of doing business by selectably mixing one or more sound files with a telephone caller's voice message, either as background for that message or embedded within the message. Or, the mixing may occur within a telephone conversation between parties. The disclosed techniques enable alleviating some of the problems that result from distance communication (as contrasted to face-to-face communication). In particular, context information (such as emotional context) can be provided through appropriate use of background sound and/or embedded audio files. The disclosed techniques may also make communication through voice mail exchange more enjoyable and/or increase its productivity.
摘要:
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.