摘要:
A means by which possession of a credit card can be validated in transactions over the Internet is presented. As part of the payment transaction, a vendor instructs the user to use an electronic camera to take a picture of the credit card in a specific situation, such as being held in the user's hand or held against a generated computer screen. The resulting picture is emailed to the vendor, who forwards the image to the credit card company for verification.
摘要:
A method, computer program product, and a data processing system for distributing attendee information for use in a physical encounter involving multiple attendees is provided. An identifier assigned to a first data processing system associated with a first attendee is received by wireless transmission. A query including the identifier is formulated. The query is executed on an attendee database. A record of the database including an identity of the first attendee is wirelessly transmitted to a second data processing system associated with a second attendee responsive to execution of the query.
摘要:
Screensaver functionality is provided at the individual window level. A windows security module monitors the windows displayed by the computer to detect when a window becomes inactive in the display, for example by the user clicking and working within another window in the display. Upon becoming inactive, the windows security module overrides the application data being sent to a secured window and displays a predetermined screensaver-type image in its place, thereby hiding sensitive information from being displayed by the window during periods of inactivity. The windows security module can implement any user selected security type to hide or obscure the windows content such as blanking the individual window, displaying a text message or other graphic in the window, or minimizing the individual window upon becoming inactive. A time delay can also be set to delay the assertion of the security feature until a specified time following the window becoming inactive.
摘要:
A method and system for searching source code of computer programs using parse trees are provided. With the method and system, a search query is provided in terms of the utility desired from source code meeting the search query. For example, a series of functions or operations to be performed by source code, that are indicative of the source code that is desired to be found by a user, may be entered as a search query. The search query is converted to one or more parse trees which are then compared against parse trees of source code maintained by the source code search engine database. Parse trees that have nodes matching the parse tree(s) of the search query are identified and a ranking of the extent of the matching between the parse trees is generated. Ranked search results are then returned identifying the source code that matches the search query.
摘要:
A system, method, and computer-usable medium for mitigating audible acknowledgement volume in a vehicle security system. A preferred embodiment of the present invention includes measuring an amplitude of a valid signal, in response to receiving the valid signal; in response to determining the amplitude of the valid signal, comparing the amplitude to a first predetermined threshold; in response to the comparison, adjusting a volume setting of an audible acknowledgement; further adjusting the volume setting in response to measuring ambient noise of a surrounding location; and emitting the audible acknowledgement.
摘要:
Dynamic language checking includes identifying questionable language usage; creating a query in dependence upon the questionable language usage; querying a search engine with the query; receiving from the search engine search result statistics describing the search results for the query; and determining, in dependence upon search results statistics returned by the search engine, whether the questionable language usage is proper language usage.
摘要:
A method of regulating electronic message traffic is proposed. The method comprises sending an electronic message as part of a thread, receiving a response to the message, and tabulating said response in a counter. A data processing system compares the counter to a threshold and, in response to the comparing step, designates the thread as off-topic.
摘要:
Methods, systems, and computer program products are described for logging off a user from a website, including detecting through a browser a predefined exit channel for a website; detecting a user's leaving the website outside the predefined exit channel; and guiding browser operation toward the predefined exit channel.
摘要:
A system, system, and program for facilitating navigation of voice data are provided. Tokens are added to voice data based on predefined content criteria. Then, bidirectional scanning of the voice data to a next token within the voice data is enabled, such that navigation to pertinent locations within the voice data during playback is facilitated. When adding tokens to voice data, the voice data may be scanned to detect pauses, changes in voice inflection, and other vocal characteristics. Based on the detected vocal characteristics, tokens identifying ends of sentences, separations between words, and other structures are marked. In addition, when adding tokens to voice data, the voice data may be first converted to text. The text is then scanned for keywords, phrases, and types of information. Tokens are added in the voice data at locations identified within the text as meeting the predefined content criteria.
摘要:
A WIFI-enabled and GPS-enabled user device executes a hotspot location utility, which enables the device to detect WIFI hotspots and update a locally-stored hotspot location database (LHLD) containing geographically-mapped hotspots. When a hotspot is detected, the device accesses the hotspot, retrieves identification information and usage terms from the hotspot, and measures performance metrics of the hotspot. The utility stores the identified hotspot with the current GPS coordinate as an entry within the LHLD. When a user later desires to locate hotspots within a particular geographic location, the user enters the physical address of the location, and hotspots with matching (or proximate) GPS coordinates of the entered address are presented to the user. The user may specify certain preferences for usage terms, performance metrics, and location criteria, and the utility filters all geographic hits and returns only hotspots in the geographic location that also satisfy these preferences.