摘要:
One embodiment of a method of the present invention provides for obtaining an image from a requester, obtaining contact information for vouching people, whom requester identifies as having personal knowledge of the requester, and sending an electronic message to the vouching people, with a link to an image lineup. The image lineup contains the image obtained from the requester and other images. Then receiving a selection choice from the vouching people, identifying whether the image in the image lineup depicts the requester, and calculating a statistical rating of a likelihood that the image obtained from the requester depicts him/her.
摘要:
Systems and methods provide for hosting one or more server computers comprising a project management software. The project management software may comprise a first story board comprising one or more stories for a first team. The first story board may be controlled by one or more first story board control panels. The project management software may also comprise a second story board comprising one or more stories for a second team. A sub-story may be created using the one or more first story board control panels. In one embodiment, this sub-story may be inserted into a backlog list for the second story board and an alert may be displayed on the second story board requesting the second team to implement the sub-story from the backlog list into the second story board. In another embodiment, the stories on the second story board may be about, but not used by, a second team. The first team may be responsible for updating the one or more stories to move the one or more stories, including the sub-story, through the second story board.
摘要:
One embodiment of the present invention envisions providing requester with an application for a mobile device equipped with a built-in digital photo camera. The application controls the camera and prevents alterations to an image taken with the camera. The unaltered image of a portrait photograph of the requester is transmitted from the mobile device to the verifier's server computer. The image of the portrait photograph of the requester may further be used to verify the requester by comparing the image to the photographs from other sources.
摘要:
The present invention provides systems and methods for enabling encrypted communication capabilities for a Subscriber's Web Site, thereby allowing Customers to access the Subscriber's Web Site in a secure manner. A Hosting Provider, that hosts the Subscriber's Web Site, and a Certificate Authority (CA), that verifies the identity of the Subscriber, provide the Subscriber's Web Site with Secure Sockets Layer (SSL) encrypted communications capability. The Hosting Provider and CA communicate directly with each other as needed, typically via the Internet, without using the Subscriber as an intermediary in their communications.
摘要:
Systems and methods of the present invention provide for detecting and mitigating abuse of unsolicited email or “spam.” An administrator may select one or more contacts from a list of contacts to opt in to receive an email distribution. An abuse detection software may then determine for each contact in the contact list whether the contact has read the email distribution and reported the email distribution as an unsolicited email message. If so, an abuse department may place a hold on the email distribution (possibly using abuse mitigation software) and display an alert referring the administrator to the abuse department for review of the account. Otherwise, the email distribution may continue to completion.
摘要:
Systems and methods of the present invention provide for detecting and mitigating abuse of undeliverable email or “bounced” emails. An administrator may import a list of email addresses for one or more contacts. The opt-in software may determine if each email address in the list of email addresses is opted in to receive an email distribution, and if so, a bounce detection software may determine if each email address is found in a database of known undeliverable or “bounced” email addresses. If so, an abuse-mitigation software may defer importing the list of email addresses and display an alert referring the administrator to an abuse department for review of the account. A message-delivery software may deliver the email distribution, and the bounce detection software may then determine whether undeliverable emails in the email distribution exceed one or more “bounce limit rules,” and if so, the abuse mitigation software may delay delivery of the email distribution and display an alert referring the administrator to the abuse department for review of the account. Otherwise, delivery may continue to completion.
摘要:
Methods of the present invention allow a static product category to be received from a user for a product on an ecommerce site. The user may then be enabled to dynamically associate the product with the static product category using a metadata tag.
摘要:
A Registering Entity or another entity may provide a framework for collecting WHOIS Business Information from a Non-Controlling Party of a domain name and entering it into WHOIS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting WHOIS Business Information from Non-Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. WHOIS Business Information will be typically available for viewing to everyone along with the traditional WHOIS information.
摘要:
Systems and methods of the present invention provide for the spinning and appraisal of a domain name. A list of keywords may be extracted from a domain name entered into a user interface on a client. These keywords may be compared to potential matches in a database and a result set may be compiled and displayed to the user. The client may also display a certified domain name appraisal using a plurality of logical groupings within a domain name appraisal process. This appraisal process may also include a multiplier derived from comparisons of registration statistics for various top level domains.
摘要:
Systems and methods of the present invention provide for the spinning and appraisal of a domain name. A list of keywords may be extracted from a domain name entered into a user interface on a client. These keywords may be compared to potential matches in a database and a result set may be compiled and displayed to the user. The client may also display a certified domain name appraisal using a plurality of logical groupings within a domain name appraisal process. This appraisal process may also include a multiplier derived from comparisons of registration statistics for various top level domains.