Abstract:
A computer-implemented method for processing single message transactions with batch settlement may include receiving a dual-message transaction from a merchant, converting the received dual-message transaction to a single-message transaction, setting a flag on the converted single-message transaction indicating the conversion to a single-message transaction, receiving a batch settlement file from the merchant, for each transaction in the batch settlement file, determining whether the single-message transaction conversion flag is set, upon determining that the single-message transaction conversion flag is not set, storing the transaction for later processing, and upon determining that the single-message transaction conversion flag is set, sending the transaction to a payment network.
Abstract:
A network-accessible Web service is generated without a user having to code the logic of the Web service using a programming language. The Web service is represented as a sheet element within a graphical user interface (GUI) displayed on the screen of a computing device. A number of cards for the Web service are defined. The cards define the logic of the Web service, and effectuate the functionality of the Web service. Each card is represented as a card element on the sheet element within the GUI. By manipulating and modifying the cards, a user is thus able to generate a Web service without having to code the logic of the Web service with a programming language.
Abstract:
A method (and structure) of providing a composite data feed for an online meeting includes at least one of providing a capability for at least one participant node in the online meeting to input a layout rule for a customized composite image of the online meeting and receiving a layout rule defining a composite image of the online meeting that can be customized for at least one participant node in the online meeting.
Abstract:
A method of printing and distributing time sensitive documents. The method of printing includes receiving an intended delivery location with each of a plurality of documents, determining a time required to deliver each document to the intended delivery location, determining a desired date of receipt and printing each document to allow for the time required to deliver each document on the desired date of receipt. Moreover, each document can be printed in-line with a corresponding shipping label. The documents and shipping labels may be customer specific. The shipping labels can also be secured to the documents, by stapling, binding, gluing or any other means, in-line to avoid many problems.
Abstract:
A first cryptographic device is configured to generate a passcode for submission to a second authentication device. The second authentication device determines a particular type of shuffling to be applied to a passcode in conjunction with submission of that passcode for authentication, and verifies that the passcode has been entered in accordance with the particular type of shuffling. The first cryptographic device may comprise an authentication token and the second cryptographic device may comprise at least one authentication server. By way of example, the second cryptographic device may generate a shuffle indicator signal specifying the particular type of shuffling, such that the shuffle indicator signal can be transmitted and thereby made apparent to a user associated with the first cryptographic device. The user then alters his or her manner of entry of the passcode based on the received shuffle indicator signal, such as entering the passcode in a reverse order.
Abstract:
An improved authentication technique employs a user's mobile device to obtain a picture of the user from which facial geometry is extracted and applied as part of an authentication operation of the user to the remote network. In some examples, a server stores facial geometry for different users along with associated PINs. By matching facial geometry of the user with facial geometry on the server, the user's PIN can be obtained, without the user ever having to register or remember the PIN.
Abstract:
Event-based biometric authentication is provided using a mobile device of a user. A user attempting to access a protected resource is authenticated by receiving a request to access the protected resource; collecting biometric information from the user in response to the request using a mobile device of the user; performing biometric authentication of the user using the collected biometric information; and granting access to the protected resource based on the biometric authentication. The authentication optionally comprises an event-based authentication. The mobile device does not have to contain token generating material.
Abstract:
A method, system, and computer instructions for the queuing of location-based task-oriented content. A content service provider receives content for a location-dependent task to be delivered to a particular client computing device. The content service provider determines if the content is above a threshold associated with the location-dependent task. Responsive to a determination that the content is above the threshold, rerouting the content to a storage repository associated with another location-dependent task, wherein a user may address the content at a later time.