Abstract:
Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established.
Abstract:
A mechanism for indicating a specific response message to be played to a caller is provided. A call that comprises an identification of a caller is received in a recipient device. If the recipient device is operating in the phone management mode, a recipient notification of the call is blocked on the recipient device. If the caller is identified as a known caller based on the identification of the caller, a caller specific response message is sent to the known caller. The caller specific response message is at least one of an interactive or a non-interactive caller specific response message. The interactive response message includes a code with which to respond. If the response message is the interactive response message and the caller enters the code associated with the interactive response message, then the recipient notification of the call is activated, on the recipient device.
Abstract:
An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices.
Abstract:
Methods, systems, and computer program products for exchanging instant messages among a plurality of users of data processing client entities (such as personal computers) are disclosed. For each user, a corresponding method starts with associating a profile with the user. The profile defines a set of (one or more) events, and for each event a set of (one or more) corresponding actions. The method continues by detecting the occurrence of one of the events. A selected action corresponding to the occurred event is then executed.
Abstract:
A mechanism for indicating a specific response message to be played to a caller is provided. A call that comprises an identification of a caller is received in a recipient device. If the recipient device is operating in the phone management mode, a recipient notification of the call is blocked on the recipient device. If the caller is identified as a known caller based on the identification of the caller, a caller specific response message is sent to the known caller. The caller specific response message is at least one of an interactive or a non-interactive caller specific response message. The interactive response message includes a code with which to respond. If the response message is the interactive response message and the caller enters the code associated with the interactive response message, then the recipient notification of the call is activated on the recipient device.
Abstract:
An arrangement permitting a user for example in a internet point or using a different profile in the same machine can connect to a web server to download and install local client software such as a java application or a browser plug-in the first time he accesses to this service from that browser in order to customize his environment. Once authenticated, he can choose the personalization to be performed in whatever application installed and eligible to be user customizable. For example he can replicate in the system his browser settings (favorites, cookies, forms etc) or word templates as a clone of environment setting of his personal machine. The customization can depend on pre-defined profiles to allow the user customization of a subset of settings, for example only browser settings. Models of different operating environments are defined and called upon to enable interactions with different client devices.
Abstract:
A software program executable on a mobile telephone suitable to cause said telephone to interrogate a distant recipient telephone by means for example of JTAPI to determine whether the recipient telephone is turned on or not. In a case where it is determined that the recipient telephone is turned on, an SMS message is sent to the recipient telephone. In a case where the voice connection cannot be made it is determined that the recipient telephone is turned off, and a further attempt to make a voice connection is made after a predetermined period. Further attempts are made repeatedly until it is determined that the recipient telephone is turned on, and an SMS message is sent to the recipient telephone, or until sending of the SMS is cancelled by a user.
Abstract:
A method for the automatic assignment of a work unit to one of at least two agents for the execution thereof, comprising: assigning to the work unit a first attribute describing ranking of the work units; real-time calculating a current workloads of the agents, wherein said calculating is based on a number of work units currently assigned to the agents and on the respective ranking; and assigning the work unit based on the calculated current workloads of the at least two agents.
Abstract:
Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established.
Abstract:
A software program executable on a mobile telephone suitable to cause said telephone to interrogate a distant recipient telephone by means for example of JTAPI to determine whether the recipient telephone is turned on or not. In a case where it is determined that the recipient telephone is turned on, an SMS message is sent to the recipient telephone. In a case where the voice connection cannot be made it is determined that the recipient telephone is turned off, and a further attempt to make a voice connection is made after a predetermined period. Further attempts are made repeatedly until it is determined that the recipient telephone is turned on, and an SMS message is sent to the recipient telephone, or until sending of the SMS is cancelled by a user.