Abstract:
A microphone apparatus includes a code generator that produces a code output and communicates with a user computer over a channel via which the microphone apparatus provides an electrical signal to the user computer. The microphone apparatus is used by the user such that the user provides authentication information comprising a user code that is generated by the code generator of the microphone apparatus.
Abstract:
A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user's language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.
Abstract:
A pre-moistened towelette wipes a compact disc clean without leaving a visible residue thereon. An ultra-pure tissue, free of binders, fillers and dyes, is permeated with a liquid cleaning preparation comprised of a highly concentrated solution of ultra-pure alcohol, a non-ionic, ultra-pure surfactant, and ultra-pure water.
Abstract:
Animation and visuals are displayed when automatically filling/changing values within a document. A scan animation may be displayed to assist a user in understanding that an action is about to occur using their recent edit(s). A fill animation may be displayed while the suggested values are automatically filled within the document. For example, the suggested values may be displayed according to an uncommitted state (e.g. light grey text) as compared to a committed state (e.g. black text) of related values. The suggested values may be accepted/rejected while they are displayed according to the uncommitted state. When the suggested values are rejected, the suggested values are removed from the display. When the suggested values are accepted, the suggested values are transitioned to the committed state. When a user performs an edit on one or more of the suggested values, a change animation may be displayed.
Abstract:
A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user's language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.
Abstract:
A device for protecting one or more credit or charge cards from radio frequency scanning is disclosed. The device comprises a rectangular-shaped planar element sized for fitting within the banknote slot of a personal carrying accessory, wherein the planar element is composed of a top layer of plastic material having an interior surface including printed information, a middle layer of a metallic foil that inhibits the transmission of radio frequency signals, and a bottom layer of plastic material having an interior surface including printed information, wherein the top layer and the bottom layer of plastic material completely cover a surface area of both sides of the middle layer, and wherein the device has a thickness of about 0.3 mm and exhibits a bending stiffness substantially equal to paper.
Abstract:
A method on a server for facilitating meal planning for a first and second individual over a communications network is disclosed. The method includes receiving a desired profile from the first individual over, matching the desired profile to a profile of the second individual, sending a message to the first individual indicating the match, receiving a command from the first individual including an offer to attend a meal with the second individual and an offer to pay for the meal, sending a message to the second individual including the offers, and receiving a command from the second individual accepting the offer to attend the meal and accepting the offer to pay for the meal, thereby executing a contract to attend a meal with the first individual, wherein the first individual pays for the meal.
Abstract:
A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user's language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.
Abstract:
Viral protein T from Human Immunodeficiency Virus Type 1 (HIV-1) is disclosed. The protein has a molecular weight of approximately 17 kD and is produced by the vpt gene of HIV-1. This protein is antigenic. Vectors capable of expressing the vpt protein are also described.