摘要:
Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information. The first authentication information may enable the social networking application to utilize a protected application programming interface call for the first social networking service and the second authentication information may enable the social networking application to utilize a protected application programming interface call for the second social networking service.
摘要:
Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface.
摘要:
Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface.
摘要:
Disclosed in one example is a method for interfacing with multiple social networks. The method includes receiving a call from a social networking service agnostic social networking application for one of a plurality of social networking functions in a first format, translating the call in the first format to a call in a second format, the second format being one of a plurality of heterogeneous social networking service application programming interface formats, and passing the call in the second format to a first social networking service by utilizing a first social networking service application programming interface.
摘要:
Disclosed in one example is a method of authenticating with multiple social network services. The method may include storing first authentication information associated with a user for a first social networking service using at least one computer processor, receiving second authentication information associated with the user for a second social networking service from a social networking application, and sending to the social networking application the first authentication information. The first authentication information may enable the social networking application to utilize a protected application programming interface call for the first social networking service and the second authentication information may enable the social networking application to utilize a protected application programming interface call for the second social networking service.
摘要:
Disclosed in some examples is a method of aggregating social networking data by receiving first authentication information for a first social networking service, the first authentication information being associated with a user and being received from a first social networking application, receiving second authentication information for a second social networking service, the second authentication information being associated with the user and being received from a second social networking application, requesting first information regarding the user from the first social networking service using the first authentication information, receiving the first information regarding the user from the first social networking service and storing the received first information, requesting second information regarding the user from the second social networking service using the second authentication information; and receiving the second information regarding the user from the second social networking service and storing the received second information.
摘要:
A method, system and apparatus for delivering an alternate Web page to a browser are provided. The method, system and apparatus include the implementation of indicating Web pages that are not authorized to be displayed by the browser using content filter settings, comparing the content filter settings to content labels incorporated in a requested Web page and delivering an alternate Web page, if there is a match. The filter settings are generated by the browser and sent to a server in a request message. The browser also incorporates a semaphore in the request message. The semaphore is used to indicate whether the comparison should be undertaken. Thus, if the semaphore is absent in the request message, the requested Web page is delivered to the browser as customary. Further, in the case where there is a match and there is not an alternate Web page specified, either the requested Web page may be delivered to the browser or a message may be delivered to the browser indicating that the requested web page is off-limit.
摘要:
The E-mail sender's address book is safeguarded from computer virus intrusion with only minimal interference with normal E-mail distribution from the sender. Complete encryption of the address book create interference with the send function in that before any E-mail function may be started, the address book must be accessed and decrypted even when the E-mail being sent does involve the address book. However, the address book may be safeguarded from the computer virus with minimum E-mail interference if only a part of the address book is encrypted. There is stored the unencrypted data representative of a plurality of aliases for plurality of addressees of electronic mail, and separately stored encrypted data representative of the electronic mail addresses of said plurality of addressees. In response to a request to send electronic mail to one of said aliases, the entry of the key to decrypt the encrypted data is required to thereby provide the address of the addressee having said alias. If no alias is entered, i.e. the full address is entered, then the E-mail is sent without requiring a key entry by the sender.
摘要:
Advanced computer hibernation functions are useful in saving a user's work environment when a user logs off a computer. The current art requires powering off the computer when entering into hibernation, and only allows a user to store a single non-reusable hibernation file for use in restoring operation when the computer is subsequently powered on. The present invention allows hibernation files to be created and stored without requiring a user to power off the computer to enter hibernation mode. Once the hibernation files are created and stored, a user achieves faster shut down of the computer when the user enters into hibernation mode by selecting from one of the existing hibernation files for advanced hibernation mode. Multiple users are allowed to save multiple work environments or files while maintaining privacy regarding each user's work environments by requiring log on identification passwords for each user.
摘要:
The present invention provides a method, apparatus, and computer implemented instructions for mitigating the mobile phone nuisance factor. The present invention causes a mobile phone to activate an “In-Public-Use” profile when in a public establishment, which has a policy for mobile phone usage. A transmitter in the public establishment broadcasts an external control signal that contains an encoded command. The circuitry, or processor instructions, in a mobile phone decodes the command and activates the profile with the identified settings from the command. When the profile is activated, an icon is displayed indicating that the profile is active. Additionally, the “In-Public-Use” profile is deactivated when the mobile phone leaves the range of the signal and the previous settings of the mobile phone are enabled.