摘要:
A system for transacting business with customers is disclosed. The system includes a dispatch division receiving a complaint from a customer related to a problem the customer is experiencing. The dispatch division then deploys a technician to repair the problem. While the technician is conducting the repair, the system permits the technician to interact with the customer and negotiate and close deals for additional or modified products, services or features that the customer may want. The system also includes provisions for allowing the technician to retrieve information related to the customer and includes features that automatically notify various appropriate business offices for follow-up with the customer.
摘要:
A mobile gateway interface that enables a supervisor to conduct typical office transactions via a remote device while the supervisor is away from the office. The remote device can be one of several items, including, for example, wireless telephones, interactive pagers, personal digital assistants, laptop computers with wireless modem, and the like. The supervisor uses the remote device to log into the mobile gateway interface. After the authentication process, the supervisor makes a transaction request through the remote device. A transaction server, which is part of the mobile gateway interface, interacts with one or more resources to process or execute the transaction request. The resources can include an intranet, the Internet, and various legacy systems. Preferably, the mobile gateway interface includes one or both voice and front-end data servers that facilitate the authentication process and execution of the transaction request.
摘要:
A cryptographic device includes an input stage receiving an input data block and a key data block made up of a plurality of sub-key data blocks, and generating a plurality of first signals therefrom. An intermediate stage is connected to the input stage and includes a plurality of substitution units. Each substitution unit substitutes data within a respective first signal. A diffuser is connected to the plurality of substitution units for mixing data to generate a diffused signal. An output stage is connected to the intermediate stage for repetitively looping back the diffused signal to the input stage for combination with a next sub-key data block. The output stage provides an output signal for the cryptographic device after the repetitively looping back is complete.
摘要:
The present invention provides for a method and apparatus for reducing interference associated with wireless communication in an area having sensitive electronic equipment. A wireless communications device receives, from an access point, a signal having a signal strength above a predetermined threshold. The wireless communications device determines a transmission power level maximum based on the received signal and then transmits a signal to the access point at a transmission power level at or below the transmission power level maximum. The wireless communications device disables the transmission when the signal strength falls below the predetermined threshold.
摘要:
Publishing content associated with an electronic file attached to an electronic mail message by executing instructions contained in the electronic mail attachment and accessing the content at a remote computer server identified by the attached file. The attached file includes computer-executable instructions, such as a computer program or script, which include an identifier for a remote server connected to a distributed computer network. This identified remote server typically hosts a web site containing content intended for viewing by the recipient of the electronic mail message. In response to launching the attached file of the electronic mail message with a viewer program, a browser program can be opened to enable the recipient to view the content of the identified remote server, typically a web site on an intranet or the global Internet. This supports the communication of electronic content by using an electronic mail message to transport an electronic file attachment having instructions that, when executed by the recipient's computer, enable the recipient to view the electronic content by accessing a server computer connected to distributed computer network.
摘要:
Embodiments of the invention are concerned with providing an integrated data collection platform and for providing an integrated view of relative performance of respective service areas making up an overall service delivery. One embodiment involves a software tool arranged to perform a process for presenting one or more sets of service assessment evaluation data, wherein each set of service assessment evaluation data corresponds to services provided by one or by different service providers; the process comprises the steps of: providing an integrated data collection platform; and arranging the integrated data collection platform to receive the one or each set of service assessment evaluation data, and, for each said set, using the data collection platform to: identify a quantifiable measure of performance for each member of the set; present the set of quantified performance measures in an integrated graphical display area such that relative performance between sets of service assessment evaluation data can be derived.
摘要:
A secondary source of dispatch information is provided in the event of a failure of a primary source of dispatch information. The second source of dispatch information can be accessed electronically by service technicians in the field when the primary source of dispatch information fails so that service technicians do not have to contact operators in a central office to obtain the dispatch information. The secondary source of dispatch information can distribute the dispatch information in a number of ways including e-mail, web and other methods.
摘要:
A method of protecting use of an entity's identity is provided. The method comprises setting a status of the identity to a first state, the first state defining a scope of permitted use of the identity, changing, in advance of an intended use of the identity, the status to a second state defining a scope of permitted use of the identity that is different from the first state, requesting use of the identity after the changing; and returning, after the requesting, the state back to the first state.