摘要:
A method and system for transmitting marketing messages, such as advertisements and/or coupons, to shoppers in a store. The marketing messages are transmitted by a low-power line-of-sight transmitter which is positioned in a specific predetermined product area. After determining the identity of a passing shopper, a tailored marketing message is sent to a wireless device being used by the passing shopper. A determination is made as to how long the marketing message was displayed on the wireless device and whether the shopper responded to the marketing message by purchasing a product that is targeted by the marketing message. Since the line-of-sight transmitter is low-power, there is no reflective bleed-over of a carrier signal for the marketing message. Since the marketing message is specifically limited to passing shoppers within a tightly defined area, the assessment of a fee charged to an advertiser for transmitting the marketing message is more exact.
摘要:
A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. If the data processing system detects that the signal strength of the wireless device has fallen below a first predetermined value for longer than a second predetermined value, the data processing system deletes a digital certificate corresponding to the wireless device from memory. Thus, when the wireless device is reintroduced into the secured zone, in response to determining that a digital certificate corresponding to the wireless device is not stored in memory, the disabling module disables the wireless device from operation within the secured zone.
摘要:
A system and method for securing data on a wireless device. A secured zone is defined by a boundary sensor. A data processing system is coupled to the boundary sensor and a wireless device. The data processing system includes a boundary controller for determining whether the wireless device has entered the secured zone. If the wireless device has entered the secured zone, a security controller queries the wireless device to determine whether the software stored on the wireless device has been subjected to unauthorized alteration. If the software has not been subjected to unauthorized alteration, the security controller enables the wireless device for operation within the secured zone.
摘要:
Operating parameters and potentially related malfunctions are gathered from end users of computer systems and used to develop a best practices profile. The profile can be used to automatically alter the operating parameters of a user computer.
摘要:
Operating parameters and potentially related malfunctions are gathered from end users of computer systems and used to develop models which can be used to subsequently establish warranty costs for customer computers based on their actual usage.
摘要:
A logon process to a computer is amended by providing an apparatus and routine which allow a user to verify that a request for the user to insert a password in a dialog box is issued by a legitimate program. As a consequence the invention improves computer system security and makes it much more difficult for rouge programs to gain access to critical and confidential user's information, such as password or the like.