Abstract:
Disclosed is a method, system and computer program for handing over a communication from a first party to a second party. The method comprises the steps of analyzing an audio communication with said first party for quality; and transcribing to text said audio communication with either a speech recognition function or a shadow or a human transcription service, based on said analyzing. The method comprises the further steps of editing the transcribed text; aligning said text with visual information viewed during said audio communication; and sending said transcribed text along with said visual information to said second party. The preferred embodiment of the invention provides a tool that can be used to great effect in the “Call Handover” scenario.
Abstract:
The invention introduces new software components into a host-agent interactive workstation such as a personal computer. The new software components, in combination, monitor and model the interactive usage of the aforementioned interactive workstation. A first software component communicates with a second software component which is a policy-based decision-making component which runs on a guest operating system that resides in a virtual machine, and together they implement policies that concern the behavior of grid computations in the presence of the interactive usage of the workstation.
Abstract:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
Abstract:
A method, system, and computer program for managing proficiency information about a degree holder. An active degree in a degree field is issued to a degree holder. The active degree includes a certification that the degree holder has completed at least one degree process, a strength value associated with the certification indicating a proficiency in the degree field, and a strength evaluator configured to adjust the strength value such that the strength value reflects the degree holder's proficiency in the degree field over time.
Abstract:
The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and/or the behavior of the target website.
Abstract:
This invention provides systems, apparatus and methods for object management, employing agents for all personal computer objects. Personal objects survive in direct proportion to the degree to which they possess attributes that give them a competitive advantage in the use of the computing systems storage and name spaces. It employs an important competitive attribute of future utility. Since it is not always possible to accurately predict future utility, assessment of competitive advantage is based on secondary attributes that can be computed and that correlate with future utility, to a greater or lesser degree. It uses a ‘coordinating mechanic’ that monitors and controls relationships between personal objects and their agents. The term “object management” applies to computer systems, but is not necessarily limited to computer entities
Abstract:
A computer controlled implementation for distributing portions of a license to use software entities, granted by a licensor to a primary licensee, to subsequent secondary licensees comprising determining a dividable value for the primary license to use a software entity, enabling the primary licensee to grant a portion of the dividable value of the primary license to use the software entity to a secondary licensee, enabling the licensor, the licensee and the secondary licensee to add value to said values of the licenses and tracking said value of the license and of the portion granted to said secondary licensee.
Abstract:
Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
Abstract:
A system and method for providing real-time, dynamic switching between first and second service providers each capable of providing a service for users over a communications network. The method includes steps of: establishing switching criterion for deciding when to switch service provision between the first service provider and second service provider; maintaining state information associated with a user's use of the service provided by a first service provider; switching between the first and second service provided over the communications network based on satisfaction of the switching criterion; and, migrating any state information maintained up to the time of switching to the second service. Preferably, the dynamic switching occurs in a manner substantially transparent to the user.
Abstract:
A method, apparatus and computer product for masking speech. The system includes a signal acquiring apparatus for generating an electrical signal representative of the speech; a processing apparatus for using the electrical signal to provide an audio signal which cancels the speech; and a signal generator, also referred to as a babble generator, for providing a speech masking signal to mask any speech not canceled. The masking signal is generated by processing the speech in one of several ways so that its content is not intelligible.