摘要:
The present invention provides a computer implemented method, system, and computer program product for selective encryption of a data transmission. A data transmission is received. When the data transmission is received, the data transmission is unmarshaled. When the transmission is unmarshaled, objects and a set of sensitive fields within the data transmission are identified by referencing a metadata database. Only the set of sensitive fields within the data transmission are encrypted to form a partially encrypted data transmission. The partially encrypted data transmission is marshaled to form a marshaled data transmission. The marshaled data transmission is transmitted to a recipient.
摘要:
The present invention provides a computer implemented method, system, and computer program product for selective encryption of a data transmission. A data transmission is received. When the data transmission is received, the data transmission is unmarshaled. When the transmission is unmarshaled, objects and a set of sensitive fields within the data transmission are identified by referencing a metadata database. Only the set of sensitive fields within the data transmission are encrypted to form a partially encrypted data transmission. The partially encrypted data transmission is marshaled to form a marshaled data transmission. The marshaled data transmission is transmitted to a recipient.
摘要:
A locking digital pen system includes memory means which is available for storing user passwords for a plurality of users. When a user wishes to activate the digital pen, the user is enabled to use the digital pen to enter a password. After verification of the password, the pen is unlocked and the system associates the user with a matching digital signature certificate. When the user wishes to lock the pen, the user is enabled to actuate a button on the pen or provide an entry to a coupled computer to initiate a locking sequence. The system then disassociates the user from the digital signature certificates so the pen can no longer be used to digitally sign documents and the pen enters a locked state. In another embodiment, an authorized user may disable the unlocking function of the pen whereby the pen may not be unlocked by entry of a password but rather only when a special code is entered into the system.
摘要:
A method and system for managing a multi-focus remote control session (RCS) within a computer system. A unique identifier (UserID) of each user and associated input devices are registered to the RCS. The users have shared concurrent control of a computer screen via the input devices. Responsive to selection of windows within the computer screen by the input devices, concurrently operative focus is provided to each selected window and is specific to the UserID associated with the input device that selected the window. Each selected window having focus may be accessed and manipulated by only the input devices associated with the UserID to which the focus provided to each selected window is specific. The selected windows to which focus has been provided are recording in a computer readable medium in association with the UserID specific to the selection of the windows.
摘要:
A method and system for converting a voice communication to a text transcription. The method comprises receiving by a computing system in a control command center, a first transmission identifier from a vehicle. The first transmission identifier identifies the vehicle. The computing system receives voice communication data for the vehicle from a user in the control command center. A software application within the computing system converts the voice communication data into text data. The computing system transmits the voice communication data, a first copy of the text data and a second transmission identifier to the vehicle. The second transmission identifier identifies the control command center. The computing system receives a confirmation request from the vehicle to confirm if the text data comprises correct information related to the voice communication data. The confirmation request is displayed on a video monitor system. The computing system transmits confirmation data to the vehicle.
摘要:
A file security protection method and system. The method is performed by an operating system of a computer system. A metadata token is received from a software application executing on the computer system. The metadata token denotes that the application has opened a file. The metadata token includes the name of the file. An initial time is set to about a time at which the metadata token was received. A loop is executed. Each iteration of the loop includes determining whether a first or second condition has been satisfied. The loop is exited if it is determined that the first or second condition has been satisfied. The first condition is that an elapsed time relative the initial time exceeds a specified threshold. The second condition is that a closeout token denoting that the file has been closed has been received from the application.
摘要:
A method and system for managing a multi-focus remote control session (RCS) within a computer system. A unique identifier (UserID) of each user and associated input devices are registered to the RCS. The users have shared concurrent control of a computer screen via the input devices. Responsive to selection of windows within the computer screen by the input devices, concurrently operative focus is provided to each selected window and is specific to the UserID associated with the input device that selected the window. Each selected window having focus may be accessed and manipulated by only the input devices associated with the UserID to which the focus provided to each selected window is specific. The selected windows to which focus has been provided are recording in a computer readable medium in association with the UserID specific to the selection of the windows.
摘要:
A method and system for managing a remote control session (RCS) during which control of input mechanisms of authorized users for manipulating a shared computer screen is time-sliced among the authorized users. No more than one authorized user has control of the input mechanisms at each time during the RCS. Each authorized user is able to view the shared portion of the computer screen throughout the RCS and has been assigned a priority, a control time slice (CTS), and an inactivity threshold. Sole control of the input mechanisms is provided to a first authorized user who requested control of the input mechanisms. Sole control of the input mechanisms is transferred from the first authorized user to a second authorized user who requested control of the input mechanisms. The first and second authorized user are each scheduled to have sole control of the input mechanisms for a specified time duration.
摘要:
A method and implementing computer system are provided in which users are enabled to create a database listing areas in which the user may be at any given moment and corresponding phone numbers to which calls directed to the user's phone number are re-routed if the user is in any of the designated areas when an incoming call is placed. In an exemplary embodiment, a global positioning system is implemented as a geographic locating device to determine the user's location at any time, and a routing server database is implemented and accessed to match the user's current location to one or more user-designated telephone numbers in an area proximate to the user's current location.
摘要:
A method and system for managing a remote control session (RCS) during which control of input mechanisms of authorized users for manipulating a shared computer screen is time-sliced among the authorized users. No more than one authorized user has control of the input mechanisms at each time during the RCS. Each authorized user is able to view the shared portion of the computer screen throughout the RCS and has been assigned a priority, a control time slice (CTS), and an inactivity threshold. Sole control of the input mechanisms is provided to a first authorized user who requested control of the input mechanisms. Sole control of the input mechanisms is transferred from the first authorized user to a second authorized user who requested control of the input mechanisms. The first and second authorized user are each scheduled to have sole control of the input mechanisms for a specified time duration.