摘要:
An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and method, a first party generates the secured communication connection object by setting parameters identifying and limiting the use of the secured communication connection object for establishing communication connections with the first party. These parameters are encapsulated with contact information for the first party such that the contact information is encrypted. The resulting secured communication connection object is then transmitted to a second party's communication device. When the second party wishes to establish a communication connection with the first party, the secured communication connection object is accessed in memory using information obtained from the object registry, the contact information is decrypted, and a communication unit is provided with the contact information for establishing a communication connection.
摘要:
A method, system, and program for providing consumer healthy habits incentives are provided. A consumable item, consumed by an individual, is detected. A health factor is detected for the consumable item. An electronic incentive is selected for the individual according to the health factor, such that the individual is encouraged to consume a healthy selection of consumable items. An electronic incentive may be further specified according to the personal health history, exercise history and consumption history of an individual.
摘要:
A computer implemented method for object destruction. An object is detected in a receptacle and identified. Based on the type of object identified, the object may be destroyed in a shredder and a confirmation of the destruction of the object is recorded for reference. The object may also be directed to a secure bin where it will not be destroyed.
摘要:
A method, system, and program for tracking locally broadcast electronic works are provided. According to one aspect of the invention, a sending player locally broadcasts an electronic work. In particular, the local broadcast may be a wireless broadcast creating an ad-hoc radio system. At least one recipient player receives the localized broadcast of the electronic work and accepts a distribution cookie for tracking distribution of the electronic work. The at least one recipient player updates the distribution cookie with tracking information about the broadcast of the electronic work, including ratings by users at the second player and purchase of the broadcast electronic work. Each of the at least one recipient players may in turn become a sending player that broadcasts the electronic work to other recipient players and requires the other recipient players to accept a copy of the distribution cookie updated by the second player. Then, responsive to detecting a network connection to a statistics server, the at least one recipient player provides the distribution cookie to the statistics server, such that localized broadcast distribution of the electronic work is tracked.
摘要:
Account transaction protection is provided during the automated authorization process of a charge account, a debit account, a personal account or a business account. After a vendor asks the authorization service provider to approve a pending transaction, the authorization service provider automatically contacts an account holder asking for approval or refusal of the pending transaction. The contact is made by telephone, or computer network, such as the Internet. After entering a PIN to establish identity, the account holder approves or rejects the pending transaction after receiving a validation request message detailing the facts of the transaction. The PIN may be a normal PIN or a duress PIN. If the duress PIN is used, indicating the account holder is under duress to approve the pending transaction, the service provider notifies the authorities. Similarly, if the account holder indicates that refusal is due to unauthorized use, the service provider contacts the authorities.
摘要:
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.
摘要:
A method, system, and program for sampling responses to communication content for use in analyzing reaction responses to other communications are provided. Responses specified by a user to varying portions of the content of a communication are gathered. These specified responses are then stored in a database according to the types of content responded to, wherein the stored responses are then accessible for use in determining reaction responses by the user in another communication comprising at least one of the types of content. In particular, the communication may include sample content to which a response is requested. Further, the communication may include a proposed communication or a transmitted communication.
摘要:
Methods, systems and computer program products for providing roaming services to a wireless telephone roaming outside of its home service area by receiving a request for roaming service from a wireless telephone that is within a roaming network and offering a special roaming contract to the user of the wireless telephone. The request for services comprises an identify of the wireless telephone wherein the identity comprises the mobile identification number and the electronic serial number. Using the identity of the wireless telephone received in the request, the roaming network determines that the wireless telephone identity is not recorded as a record within the roaming network and is therefore roaming. The method provides offering a special roaming contract to the user and then executing the special roaming contract if the user decides to accept the offer for a special roaming contract.
摘要:
An apparatus and method for merging mobile, or wireless, telephone service with existing wired telephone equipment in a facility, such as a home or business, are provided. With the apparatus and method, a converter is associated with the facility such that a wireless telephone number is associated with the converter. Telephone calls may be made to the facility via a wireless telephone network and the converter. The converter receives calls from the wireless telephone network directed to the converter, converts the format of the wireless telephone call to a wired telephone call format, and routes these calls to one or more wired telephone units in the facility. Calls originating from the wired telephone units in the facility are received by the converter which converts the call signals to an appropriate format for wireless network routing, and forwards the call to the wireless network.
摘要:
A system and method are presented for updating directory entries within an electronic communication device upon receipt of an electronic notification. Electronic communication devices may include, but are not limited to telephones, facsimile machines and electronic organizers. The system and method as described herein allows a portion of a directory entry, which may be referred to as an entry content value, to be updated within a directory of an electronic communication device upon the receipt of an altered value. For example, if a user calls a telephone number of a person listed in a directory entry of the telephone and receives a message stating that the number has been changed, the new number may be electronically transmitted to the directory of the telephone. The transfer searches the directory of the telephone for the existing entry and updates the changed entry content value. Thus, the other entry content values within the directory are not changed.