摘要:
A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.
摘要:
A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.
摘要:
A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.
摘要:
A system and method are disclosed for protecting a password assigned to a user, the method comprising: providing a password entry screen having a virtual keyboard, the virtual keyboard including a plurality of character keys arranged in a non-QWERTY format; authenticating the user if a password submitted by the user accessing the password entry screen matches a user password retrieved from a password database; and denying access to the user if the submitted password does not match the retrieved user password. The system comprises a storage module and a computer program for performing the method.
摘要:
According to one embodiment of the present invention, a method for cross-service tagging is provided. The method includes creating connections to multiple applications, each application having multiple entities. Relationships are determined between the entities within a single application and between entities across multiple applications. A tag is associated with a selected one of the entities in a first one of the multiple applications. Entities in other applications besides the first application are identified that are related to the selected entity, based on the determined relationships. The tag is propagated across multiple applications by associating the tag with the identified entities in the other applications. According to a second embodiment of the present invention, a method for inferring tags suggestions is provided. This method includes analyzing email messages to create keywords from text analysis, from bringing content and tags from other email messages or directory applications. Tags suggestions from the various sources are merged and weighed according to an algorithm.
摘要:
According to one embodiment of the present invention, a method for cross-service tagging is provided. The method includes creating connections to multiple applications, each application having multiple entities. Relationships are determined between the entities within a single application and between entities across multiple applications. A tag is associated with a selected one of the entities in a first one of the multiple applications. Entities in other applications besides the first application are identified that are related to the selected entity, based on the determined relationships. The tag is propagated across multiple applications by associating the tag with the identified entities in the other applications. According to a second embodiment of the present invention, a method for inferring tags suggestions is provided. This method includes analyzing email messages to create keywords from text analysis, from bringing content and tags from other email messages or directory applications. Tags suggestions from the various sources are merged and weighed according to an algorithm.
摘要:
Described is a method for visualization of attributes of workflow weblogs. A group of workflow weblogs is searched to find weblogs that have an attribute that satisfies a search condition. The group of workflow weblogs can include instantiations of a single workflow. Attributes are displayed for each of the weblogs found by the search. An attribute is displayed using a modified graphical parameter if the attribute satisfies a predefined condition for the attribute type. The modified graphical parameter can include modified text or a modified graphical structure.
摘要:
A method of operating an embedded memory having (i) a local memory, (ii) a system memory, and (iii) a multi-level cache memory coupled between a processor and the system memory. According to one embodiment of the method, a two-level cache memory is configured to function as a single-level cache memory by excluding the level-two (L2) cache from the cache-transfer path between the processor and the system memory. The excluded L2-cache is then mapped as an independently addressable memory unit within the embedded memory that functions as an extension of the local memory, a separate additional local memory, or an extension of the system memory.
摘要:
A system for providing a local computer system user with detail information about remote computer system users, such as users of separate client computer systems from that of the local user. The detail information regarding remote users is obtained by a client software program on the local computer system, and originates in at least one program and/or system external to the client application software providing the detail information to the local user. The detail information is accessible through graphical objects associated with remote users, and presented either within a visual context of an awareness client program, or within the visual context of an application program external to the awareness client program. Users are able to control the specific detail information about them that is made available to other users.
摘要:
Described is a method for tracking the status of a workflow. Each step of the workflow is performed by one or more members of the workflow and each member has at least one workflow role. A weblog is generated to track an instance of the workflow and members are assigned to the weblog. An entry is posted in the weblog to indicate the performance of a workflow action, such as the completion of a workflow step or the execution of a workflow exception. The entry can be made directly into the weblog or may be in response to an entry made in a personal weblog. A workflow feed can be provided to an aggregator to permit monitoring of the workflow along with other workflows and weblog entries. Additionally, the viewing of weblog entries can be restricted to a predetermined group of users.