摘要:
A method, computer program product, and a data processing system for distributing attendee information for use in a physical encounter involving multiple attendees is provided. An identifier assigned to a first data processing system associated with a first attendee is received by wireless transmission. A query including the identifier is formulated. The query is executed on an attendee database. A record of the database including an identity of the first attendee is wirelessly transmitted to a second data processing system associated with a second attendee responsive to execution of the query.
摘要:
A method, system, and program provide for voice mail management. A voice mail filtering controller calculates a separate Bayesian score for each voice mail message from among multiple voice mail message entries received into a voice mailbox for a user, wherein each separate Bayesian score indicates a probability that the associated voice mail message is unwanted by said user. During playback, the voice mail filtering controller automatically deletes a selection of the voice mail messages each with a separate Bayesian score greater than a particular Bayesian score of the last played voice mail message from the voice mailbox.
摘要:
A method, system, and program for user controlled anonymity when evaluating into a role are provided. An anonymous authentication controller enables a user to control anonymity of the user's identity for role based network accesses to resources, without requiring reliance on any single third party to maintain user anonymity. First, a role authentication certificate is received from a role authenticator, wherein the role authentication certificate certifies that the holder of the role authentication certificate is a member of a particular role without allowing the role authenticator issuing the role authentication certificate the ability to track an identity of a user holding the role authentication certificate. Next, an anonymous channel is established for anonymously presenting the role authentication certificate to a resource protector, wherein the resource protector requires the user to authenticate into the particular role to access a resource, wherein the role authentication certificate authenticates the user into the particular role without enabling the resource protector to ascertain the identity of the user, such that the user is in control of maintaining user anonymity for authenticated role-based accesses.
摘要:
A user input mechanism is provided that allows a user to enter words as gestures on a virtual keyboard presented on the display device. The user input mechanism combines two existing and prevalent forms of user input: cursive handwriting and keyboard input. A familiar keyboard layout is presented on the display. A user then may place an implement, such as a stylus or the user's finger, in contact with the display. Typically, the implement will first touch the screen at a position of a first character in a word. The user then may move the implement along the surface of the display from character to character, spelling out a word.
摘要:
A system, apparatus and method of displaying images based on image content are provided. To do so, a database of offensive images is maintained. Stored in the database, however, are hashed versions of the offensive images. When a user is accessing a Web page and the Web page contains an image, the image is hashed and the hashed image is compared to hashed images stored in the database. A match between the message digest of the image on the Web page and one of the stored message digests indicates that the image is offensive. All offensive images are precluded from being displayed.
摘要:
A mechanism for determining a probabilistic security score for a software package is provided. The mechanism calculates a raw numerical score that is probabilistically linked to how many security vulnerabilities are present in the source code. The score may then be used to assign a security rating that can be used in either absolute form or comparative form. The mechanism uses a source code analysis tool to determine a number of critical vulnerabilities, a number of serious vulnerabilities, and a number of inconsequential vulnerabilities. The mechanism may then determine a score based on the numbers of vulnerabilities and the number of lines of code.
摘要:
The present invention is a method and system that adjusts the contents on a display screen based on the distance of the user from the screen. This invention comprises a display screen with a distance approximator mechanism either attached the display screen or positioned in close proximity to the screen. This distance approximator detects user movement and calculates the distance that the user is from the screen. As the distance of the user from the screen increases or decreases, the method of the invention adjusts the contents of the screen. The screen adjustments can comprise enlarging the size of the information on the screen as the user moves further from the screen. The contents can also be reduced as the user returns to a local distance to the display screen. The display content adjustment techniques of the present invention enable a user to view screen contents from abnormally far distances from the screen without the need for the user to continually travel back and forth to and from the display screen.
摘要:
A system for managing security index scores is provided. A security index that rates the security level of a portion of code is associated with the code. Development tools, such as packaging utilities, compilers, integrated development environments, and the like, may warn the user if the security level of the portion of the code is low. Source code repository tools, such as concurrent versioning systems, may deny submitted source code if the security index is below a threshold or below a previous version. Installation tools may warn a user or refuse to install a software package if an associated security index is low. Security index scores may be maintained and digitally signed by a trusted third party.
摘要:
The present invention is a method and system that determines the connection availability of a mobile or cellular device to the communication network in the current location of the mobile or cellular device. The system of the present invention comprises a communication tower containing a means to monitor the current connection capacity of the tower. This monitoring process would involve establishing the maximum call connection capability of the tower. This process also maintains a current count of the number of calling devices that are connected through the tower. As the number of connections increases toward the maximum number of connections, the tower will begin to broadcast messages to mobile and cellular telephone devices in the area of the tower the current connection capability to that tower. The mobile or cellular devices would receive the message and display the information to the device user. With this information, the user could decide whether to continue to attempt to call via the tower or to wait to a later time or until the caller is in another area than the current calling tower.
摘要:
Exemplary embodiments of the present invention include a method for providing a password to an application. Such exemplary embodiments include receiving, from a user, a passkey event uniquely associated with one of a plurality of applications requiring a password, and receiving, from a user, a same master password for access to each of the plurality of applications, applying a hashing algorithm associated with the separate input event to the master password to generate an application specific password, and submitting the application specific password to the application for access by the user. In some embodiments, receiving, from a user, a passkey event uniquely associated with any given one of the plurality of applications includes receiving, from a user, an event created by a user's engaging a keyboard key.