摘要:
According to one embodiment of the invention, a computerized method for simulating movement of a living object includes storing a plurality of sets of data, in which each set of data is indicative of an empirical path of a first segment of a first living object, receiving a start point and an end point for a desired movement of a second segment of a second living object, comparing the desired movement of the second segment to the stored sets of data, selecting, based on the comparison, a stored set of data that is representative of the desired movement of the second segment, and simulating the desired movement of the second segment based on the start point, the end point, and the empirical path associated with the selected set of data.
摘要:
Systems and/or methods for establishing and maintaining authenticity of a plurality of records and/or documentary materials to be persisted in an electronic archives system are provided. Each record and/or documentary material may be safeguarded throughout its entire lifecycle by monitoring and recording both intended changes to each said record and/or documentary material and its corresponding status, as well as unintended changes to each said record and/or documentary material. Context and structure associated with each said record and/or documentary material may be extracted and preserved. Substantially uninterrupted proof-of-custody including at least a source may be established and preserved for each said record and/or documentary material throughout its entire lifecycle. Essential characteristics of each said record and/or documentary material may be captured and preserved throughout its lifecycle in dependence on one or more changeable definitions of essential characteristic. The plurality of record and/or documentary material and all preserved information may be stored. The archives system may be scalable essentially without limitation. The authenticity of the plurality of record and/or documentary material may be comprehensively storable and maintainable over an indefinite period of time in a substantially obsolescence-proof manner despite changeability of the records and/or documentary materials, record and/or documentary material custody, and/or essential characteristic definitions.
摘要:
A system and method for context management which addresses the above problems while isolating the context management functions from the other functional code found on the server system. The context management system includes a context manager component which stores and retrieves name-value pairs describing the context in which the current request is being processed. In doing so, three types of context data are distinguished: static, dynamic, and transient. The context manager stores context data regarding each of a user's sessions and page flows, and returns context data in response to requests from the server system. Using this context data, the server system can then interact with the user in a manner appropriate to the user's context.
摘要:
An electronic map device apparatus, and an associated method, creates a route between a route source and a route destination for display at the electronic map device. Locations, area, and features that a user does not desire to encounter during travel along the route are identified and form exclusion information. The exclusion information is entered by way of a user interface. The exclusion information is utilized in the formation of the selected route. A mapping that identifies the selected route is displayed at a display device of the user interface.
摘要:
An electronic, handheld transaction register device for indicating an account balance of a bank, or other, account that permits two or more parties to make transactions in the account independent of one another. When a transaction is made, a synchronization signal is generated and sent to the electronic, handheld transaction register device. Responsive to detection of the synchronization signal, a local transaction register is adjusted to reconcile the account. A display is generated, providing a user of the device with an up-to-date and accurate indication of the account balance.
摘要:
Apparatus, and an associated method, for maintaining data, such as a data file, in secure form. Security keys are stored and maintained at a central location. The security key is downloaded to a device that is to operate upon the data. When the security key is authorized to be downloaded to a computer device, a time boundary is associated with the security key. The time boundary defines the period of usability of the security key. The security key is used at the computer device to encrypt the data each time the data is written to storage and to decrypt the data each time the data is read from storage. Thereby, at all times, when the data is stored at storage, the data is maintained in secure form.
摘要:
A device for identifying preferred television programming, or other multi-media, content and providing the identified content on a personalized channel. An identifier identifies the preferred content through monitoring of the viewing habits of a viewer. Manual input of information is also permitted to identify, or edit, the preferred content and its viewing schedule. Once the preferred content is identified, the content is provided on a personalized channel. And when the viewer selects to view the personalized channel, the preferred content, preferred by the user is viewed by viewing the single, personalized channel.
摘要:
A secure service delivery network, including a service delivery compartment connected to deliver services to a plurality of client networks. The secure service delivery network includes a first firewall connecting the service delivery compartment to a first virtual local area network. The secure service delivery network includes a plurality of firewalls each connecting one of the plurality of client networks to the first virtual local area network, whereby no communications between the plurality of client networks can be made over the first virtual local area network. A related method is also described.
摘要:
A method and system for authenticated dynamic extension of security domain boundaries includes high security domain extension instructions for sequentially and dynamically forming an extended high security domain (133) through a protected communication path (128). The protected communication path (128) extends from a first computer (10) associated with a high security domain (80) into a second computer (10) associated with low security domain (120). The method and system establish the extended high security domain (133) within the second computer (10). A protected communication path (128) forms an isolation barrier (131) separating the extended high security domain (133) from other objects (126) within the low security domain (120). Authentication instructions (146) temporarily 20 authenticate at least one object (132) associated with the low security domain (120). Returning instructions (156) return the at least one object (132) processed within the extended high security domain (133) to said low security domain (120).
摘要:
A method for accounting for data processing system service usage is provided. The method comprises monitoring a total environmental consumption related to an information technology resource, determining a percentage of the information technology resource used by a customer, and determining an environmental factor corresponding to a product of the percentage of the information technology resource used by the customer with the total environmental consumption related to the information technology resource and integrating the product over a billing period. The method further comprises determining an information technology factor corresponding to a sum of a total network usage, a total storage usage, and a total processor usage for the customer over the billing period, determining a total bill for the customer according to the environmental factor and the information technology factor, and storing the total bill for the customer in a computer-readable medium.