摘要:
A distribution system and method. The distribution system comprises a computing apparatus and a plurality of projection systems connected to the computing apparatus. The computing apparatus comprises a scheduler software tool and a plurality of audio/video data files stored on a computer readable medium. Each projection system of the plurality of projection systems comprises a cache storage device connected to an associated projection apparatus. Each cache storage device is adapted to dynamically receive and store an associated audio/video data file from the plurality of audio/video data files for transmission to each associated projection apparatus according to a schedule generated by the scheduler software tool.
摘要:
A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
摘要:
Servlets within a web server maintain state information concerning requests made by users of the server. The servlets associate each user with an HTTP session object. The session object is configured to include information that identifies the last-N web pages requested by the user. Periodically, or in response to a triggering event, the server analyzes the contents of the session objects, for example by tabulating the frequency with which each web page has been requested in the recent past. From the results of the analysis, web-page caching priorities are determined, and the contents of the server's cache are altered accordingly.
摘要:
A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
摘要:
A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.
摘要:
A messaging system and method suitable for use with wireless mobile terminals. The system includes a message server for receiving and sending messages and converting messages to a baseline such as an XML representation; a message processor for controlling the system's operation; a database for storing information about messaging capabilities of mobile terminals; and a transcoder for filtering the baseline representation according to the capability of a mobile terminal. A subscriber enters a profile that includes the messaging capability of the mobile terminal, which is stored in the database. When the server receives a message for the subscriber's terminal, it converts the message to the baseline. The transcoder filters the baseline according to the capability of the terminal, and returns the result to the server for format and protocol conversion and sending to the terminal.
摘要:
A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program.
摘要:
Aspects of the present invention reduce a lock wait time in a distributed processing environment. A plurality of wait-for dependencies between a first plurality of transactions and a second plurality of transactions in a distributed processing environment is identified. The first plurality of transactions waits for the second plurality of transactions to release a plurality of locks on a plurality of shared resources. An amount of time the first plurality of transactions will wait for the second plurality of transactions in the distributed processing environment is determined based on the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions. Historical transaction data related to the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions is analyzed. The amount of time the first plurality of transactions will wait for the second plurality of transactions is reduced based on the historical transaction data.
摘要:
A CAPTCHA challenge tool for determining if a user of a computer is a human or an automated program. The tool presents a set of images. At least a portion of the set of images suggests a chronological sequence when organized correctly. The tool receives a suggested order from the user of the computer. If the suggested order matches the correct order, the tool assumes that the user is a human, if the suggested order does not match the correct order, the tool assumes the user is an automated program.
摘要:
A method for enhancing the privacy of recipients of personalizing text messages such as advertisements delivered to communication terminals such as cellular telephones. A common carrier such as a cellular telephone service provider gathers personal information from a subscriber at the time the subscriber signs on for service and receives a communication terminal. The carrier loads the terminal with a table that assigns variables to elements of personal information. The carrier accepts messages such as advertisements for distribution to subscribers. These messages use the variables that the carrier has loaded into the subscribers' terminals. When such a message is received, a subscriber's terminal replaces the variables with the elements of personal information by referring to the table.