Method and system for tracking conversions in a system for targeted data delivery
    1.
    发明申请
    Method and system for tracking conversions in a system for targeted data delivery 有权
    用于跟踪目标数据传送系统中的转换的方法和系统

    公开(公告)号:US20080103971A1

    公开(公告)日:2008-05-01

    申请号:US11591388

    申请日:2006-10-31

    IPC分类号: G06Q40/00

    摘要: A system and method for tracking conversions. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. The method determines that the user has performed an action. A unique payment option is associated with the action, wherein the unique payment option is generated in response to the action. Notification is received that the user has made a payment to an online merchant using the unique payment option. The payment is associated with a conversion of the action without cooperation of the online merchant.

    摘要翻译: 用于跟踪转化的系统和方法。 具体地,该方法包括收集关于用户的用户信息并基于用户信息生成用户简档。 存储用户简档,使得用户简档被用于基于用户简档来实现针对用户的数据的传递,而不需要在用户简档中释放用户信息。 该方法确定用户已经执行了一个动作。 唯一的付款选项与该操作相关联,其中响应于该动作生成唯一的支付选项。 收到用户使用唯一付款方式向在线商家付款的通知。 付款与没有在线商家合作的行动转换相关联。

    Access Control Method And Apparatus
    2.
    发明申请
    Access Control Method And Apparatus 有权
    访问控制方法和设备

    公开(公告)号:US20100138908A1

    公开(公告)日:2010-06-03

    申请号:US11917346

    申请日:2005-06-28

    IPC分类号: G06F21/00

    摘要: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired access.

    摘要翻译: 一种控制对计算资源的访问的方法,包括向第一计算设备提供对包含指示由第一计算设备控制的计算资源访问的数据的数据库的访问以及第二计算设备必须拥有的最小安全能力以访问 相应的资源,为第二计算设备分配安全能力,向第二计算设备提供指示安全能力的数据,配置第一计算设备以响应指示安全能力的数据和指示来自第二计算设备的期望访问的数据 计算设备,通过确定对应于期望接入的最小所需安全能力,并通过将所需的最小安全能力与第二计算设备的安全能力进行比较,以及如果第二计算设备的安全能力满足最小安全性 ca 适合所需的访问。

    Framework to enable multimodal access to applications
    3.
    发明申请
    Framework to enable multimodal access to applications 审中-公开
    启用多模式访问应用程序的框架

    公开(公告)号:US20060015335A1

    公开(公告)日:2006-01-19

    申请号:US10889760

    申请日:2004-07-13

    IPC分类号: G10L15/26

    CPC分类号: G10L15/30 H04M3/4938

    摘要: A technique to link an audio enabled device with a speech driven application without specifying the specific ones of the audio enabled device-independent, speech driven application-independent, and speech application platform independent parameters. In one example embodiment, this is accomplished by using voice framework that receives and transmits digitized speech audio without specifying the specific ones of the audio enabled device-independent and speech application platform-independent parameters. The voice framework then converts the received digital speech audio to computer readable text. Further, the voice framework receives and transmits the computer readable text to the speech driven application without specifying the specific ones of the speech driven application-independent and speech application platform-independent parameters. The voice framework then converts the computer readable text to the digital speech audio.

    摘要翻译: 一种将音频启用设备与语音驱动应用相关联的技术,而不指定音频启用设备无关,独立于语音驱动的独立于应用和语音应用平台的参数的特定功能。 在一个示例实施例中,这是通过使用语音框架来实现的,所述语音框架接收和发送数字化语音音频而不指定音频使能的设备无关和与语音应用平台无关的参数中的特定的语音音频。 然后,语音框架将所接收的数字语音音频转换为计算机可读文本。 此外,语音框架接收并将计算机可读文本发送到语音驱动应用,而不指定特定的语音驱动的与应用无关的和与语音应用平台无关的参数。 然后,语音框架将计算机可读文本转换为数字语音音频。

    RFID system with a mobile RFID reader
    4.
    发明授权
    RFID system with a mobile RFID reader 有权
    RFID系统与移动RFID阅读器

    公开(公告)号:US08063738B2

    公开(公告)日:2011-11-22

    申请号:US12208344

    申请日:2008-09-11

    摘要: An RFID system includes a pair of guide tracks located on opposite boundaries of at least one zone. A channel is movably attached to the guide tracks and is configured to move along the guide tracks through the at least one zone. A mobile RFID reader is movably attached to the channel and the mobile RFID reader is paused at a plurality of read points to scan for RFID tags located. The read points are determined by an arrangement of a plurality of hexagonal areas which are grouped together to create a combined area, where the combined area is aligned with the predefined area to define locations of the plurality of hexagonal areas, and where substantially central locations of each hexagonal area represent the plurality of read points.

    摘要翻译: RFID系统包括位于至少一个区域的相对边界上的一对引导轨道。 通道可移动地附接到引导轨道并且被构造成沿导轨移动穿过至少一个区域。 移动RFID读取器可移动地连接到通道,并且移动RFID读取器在多个读取点处暂停以扫描所位于的RFID标签。 读点由多个六边形区域的布置确定,这些区域被组合在一起以形成组合区域,其中组合区域与预定义区域对准以限定多个六边形区域的位置,并且其中基本中心位置 每个六边形区域表示多个读取点。

    Method and system for tracking conversions in a system for targeted data delivery
    5.
    发明授权
    Method and system for tracking conversions in a system for targeted data delivery 有权
    用于跟踪目标数据传送系统中的转换的方法和系统

    公开(公告)号:US07895121B2

    公开(公告)日:2011-02-22

    申请号:US11591388

    申请日:2006-10-31

    IPC分类号: G06Q30/00 G06Q40/00

    摘要: A system and method for tracking conversions. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. The method determines that the user has performed an action. A unique payment option is associated with the action, wherein the unique payment option is generated in response to the action. Notification is received that the user has made a payment to an online merchant using the unique payment option. The payment is associated with a conversion of the action without cooperation of the online merchant.

    摘要翻译: 用于跟踪转化的系统和方法。 具体地,该方法包括收集关于用户的用户信息并基于用户信息生成用户简档。 存储用户简档,使得用户简档被用于基于用户简档来实现针对用户的数据的传递,而不需要在用户简档中释放用户信息。 该方法确定用户已经执行了一个动作。 唯一的付款选项与该操作相关联,其中响应于该动作生成唯一的支付选项。 收到用户使用唯一付款方式向在线商家付款的通知。 付款与没有在线商家合作的行动转换相关联。

    System, Method and Apparatus for Decrypting Data Stored on Remobable Media
    6.
    发明申请
    System, Method and Apparatus for Decrypting Data Stored on Remobable Media 有权
    用于解密存储在可读介质上的数据的系统,方法和装置

    公开(公告)号:US20080212781A1

    公开(公告)日:2008-09-04

    申请号:US11996747

    申请日:2005-08-05

    IPC分类号: H04L9/06

    CPC分类号: G06F21/602 G06F21/6218

    摘要: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.

    摘要翻译: 如果执行加密的设备丢失,不可用或用户凭据丢失,则可以对存储在可移动介质上的数据进行解密的技术。 在示例实施例中,这是通过使用管理员UID,管理员UDID,可移动介质,要解密的一个或多个数据文件的名称,管理员Pswd和密钥ID来实现的,以解密存储在与 执行加密的丢失或不可用的移动设备。

    Method and system for authenticating a user in a web-based environment
    7.
    发明授权
    Method and system for authenticating a user in a web-based environment 失效
    用于在基于Web的环境中验证用户的方法和系统

    公开(公告)号:US07313816B2

    公开(公告)日:2007-12-25

    申请号:US10022578

    申请日:2001-12-17

    IPC分类号: H04L9/32

    摘要: A system and method for authenticating a client having a privilege server, a head end server, and a web adapter performs the steps of negotiating an authentication scheme between the server proxy and the privilege server. User information is presented to the web adapter. The user information is provided to the head end server and in turn presents the information to the web adapter. The user is validated in accordance with the authentication scheme. When the user is validated a ticket is generated for the user. The ticket is presented to the client privilege server proxy that decrypts the ticket. A token is formed from the ticket and the client user identification. The token from the client is provided to the privilege server. A packet is formed having a sequence number and session key encrypted with the ticket. The packet is provided to the head end server which in turn authenticates the user. The packet is provided to the client privilege proxy which decrypts the packet and sends the ticket and the sequence number encrypted with the session key to the data server through the web adapter. User is validated at the data server and privileges are granted thereto.

    摘要翻译: 用于认证具有特权服务器,头端服务器和web适配器的客户端的系统和方法执行在服务器代理和特权服务器之间协商认证方案的步骤。 用户信息被呈现给Web适配器。 将用户信息提供给头端服务器,并将信息呈现给web适配器。 用户根据认证方案进行验证。 当用户被验证时,为用户生成故障单。 将票证提交给解密票证的客户端特权服务器代理。 令牌是从票证和客户端用户标识形成的。 来自客户端的令牌被提供给特权服务器。 形成具有使用票证加密的序列号和会话密钥的分组。 该分组被提供给头端服务器,后端认证用户。 该分组被提供给客户端特权代理,该代理对数据包进行解密,并通过web适配器将会话密钥和用会话密钥加密的序列号发送到数据服务器。 用户在数据服务器上进行验证,并授予其权限。

    SYSTEM AND METHODS FOR GROUPING SIMILAR ITEMS WITHIN A SET
    8.
    发明申请
    SYSTEM AND METHODS FOR GROUPING SIMILAR ITEMS WITHIN A SET 审中-公开
    在集合中对类似项进行分组的系统和方法

    公开(公告)号:US20140039798A1

    公开(公告)日:2014-02-06

    申请号:US13563678

    申请日:2012-07-31

    IPC分类号: G01V1/28

    摘要: A system is disclosed comprising a non-transitory, computer-readable storage device storing software. The software, when executed by a processor, causes the processor to perform the following operations for each of a plurality of non-functional electronic devices: count a number of other non-functional electronic devices within a defined distance from the non-functional electronic device; and define the non-functional electronic device to be a core electronic device if the counted number is at least a threshold value, wherein threshold value is based on a total number of electronic devices within the defined distance around the non-functional electronic device. For each core electronic device, the software, when executed by a processor, further causes the processor to form a neighborhood group comprising the core electronic device and other non-functional electronic devices within the defined distance around the core electronic device.

    摘要翻译: 公开了一种包括存储软件的非暂时的计算机可读存储设备的系统。 该软件在由处理器执行时使得处理器对多个非功能性电子设备中的每一个执行以下操作:对来自非功能电子设备的限定距离内的多个其他非功能电子设备进行计数 ; 并且如果所计数的数量至少为阈值,则将所述非功能性电子设备定义为核心电子设备,其中阈值基于所述非功能电子设备周围所述限定距离内的电子设备的总数量。 对于每个核心电子设备,当由处理器执行时,软件进一步使得处理器在围绕核心电子设备的限定距离内形成包括核心电子设备和其他非功能电子设备的邻域组。

    Access control method and apparatus
    9.
    发明授权
    Access control method and apparatus 有权
    访问控制方法和装置

    公开(公告)号:US08474031B2

    公开(公告)日:2013-06-25

    申请号:US11917346

    申请日:2005-06-28

    IPC分类号: G06F9/00 G06F15/177

    摘要: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired access.

    摘要翻译: 一种控制对计算资源的访问的方法,包括向第一计算设备提供对包含指示由第一计算设备控制的计算资源访问的数据的数据库的访问以及第二计算设备必须拥有的最小安全能力以访问 相应的资源,为第二计算设备分配安全能力,向第二计算设备提供指示安全能力的数据,配置第一计算设备以响应指示安全能力的数据和指示来自第二计算设备的期望访问的数据 计算设备,通过确定对应于期望接入的最小所需安全能力,并通过将所需的最小安全能力与第二计算设备的安全能力进行比较,以及如果第二计算设备的安全能力满足最小安全性 ca 适合所需的访问。

    Managing of items distributed in a global supply chain
    10.
    发明授权
    Managing of items distributed in a global supply chain 有权
    管理分布在全球供应链中的物品

    公开(公告)号:US08195189B2

    公开(公告)日:2012-06-05

    申请号:US11781274

    申请日:2007-07-23

    IPC分类号: H04W24/00 H04M11/04 H04M3/42

    CPC分类号: G06Q10/06

    摘要: A method for determining locations in a predefined area for placing a Radio Frequency Identification (RFID) reader in order to obtain a full coverage of the predefined area is provided. The method includes arranging a plurality of hexagonal area to form a combined area until the total area of the combined area is equal or larger than the predefined area, aligning the predefined area within the combined area, and determining the hexagonal area which is fully or partially covered by the predefined area. Each hexagonal area represents an area of coverage of the RFID reader, and the center of the hexagonal area which is determined to be fully or partially covered by the predefined area corresponds to one of the locations for placing the RFID reader.

    摘要翻译: 提供了一种用于确定用于放置射频识别(RFID)读取器的预定义区域中的位置以便获得预定区域的完全覆盖的方法。 该方法包括布置多个六边形区域以形成组合区域,直到组合区域的总面积等于或大于预定区域,使组合区域内的预定区域对准,并且确定完全或部分地六边形区域 被预定义区域覆盖。 每个六边形区域表示RFID读取器的覆盖区域,并且被确定为被预定区域完全或部分覆盖的六边形区域的中心对应于用于放置RFID读取器的位置之一。