Establishing user-confidence levels of data inputs

    公开(公告)号:US10061835B2

    公开(公告)日:2018-08-28

    申请号:US14064600

    申请日:2013-10-28

    CPC classification number: G06F16/284 G06F17/243

    Abstract: An embodiment takes the form of a method carried out by a computing system comprising a processor and instructions for carrying out the method. The method includes (i) presenting via a user interface a plurality of data-input fields having an associated default order for user entry of respective values in the respective data-input fields, (ii) receiving respective values entered via the user interface in the respective data-input fields, (iii) storing a respective current counter value of an incrementing counter in association with receiving each respective entered value, (iv) establishing a respective user-confidence level for each of one or more of the respective entered values, wherein each established user-confidence level is set based at least in part on a comparison of the associated default order with a set of one or more of the stored counter values, and (v) outputting one or more of the established user-confidence levels.

    Methods and systems for token-based application management
    3.
    发明授权
    Methods and systems for token-based application management 有权
    基于令牌的应用程序管理的方法和系统

    公开(公告)号:US09332010B2

    公开(公告)日:2016-05-03

    申请号:US14200606

    申请日:2014-03-07

    CPC classification number: H04L63/0853 G06F9/485

    Abstract: Disclosed herein are methods and systems for token-based application management. In an embodiment, requests are received from applications for tokens that can be active or inactive. A token-interaction-directive pool is maintained in data storage, each directive having a triggering token, a target token, and one or both of triggering-token actions and target-token actions. Responsive to receiving a token request from an application, any directives having their triggering token equal the requested token and having their target token active are identified. A response plan that includes the actions in the identified directives is generated. Any triggering-token actions in the response plan are communicated to the requesting application, and any target-token actions in the response plan are communicated to each application that is authorized to access the corresponding target token.

    Abstract translation: 这里公开了用于基于令牌的应用程序管理的方法和系统。 在一个实施例中,从可以是活动或非活动的令牌的应用程序接收请求。 令牌 - 交互指令池被维护在数据存储中,每个指令具有触发令牌,目标令牌以及触发令牌操作和目标令牌动作中的一个或两个。 响应于从应用程序接收到令牌请求,识别出其触发令牌等于所请求的令牌并使其目标令牌处于活动状态的任何指令。 生成包含已识别指令中的操作的响应计划。 将响应计划中的任何触发令牌操作传送到请求应用程序,并将响应计划中的任何目标令牌操作传递给被授权访问相应的目标令牌的每个应用程序。

Patent Agency Ranking