摘要:
An intelligent method of e-commerce order completion automatically completes an order using either stored billing information, or information supplied at purchase if none is stored. User sends an order to a merchant. On receipt, user's authentication level is checked. If user is authenticated and billing information has been stored, it is retrieved and order completed without further user action. When none has been stored, flow redirects to a digital form for entering billing information, whereupon order is completed. In this case, after order completion, the user may save billing information to create a new digital wallet. To create the wallet, if the user isn't authenticated, or is insufficiently authenticated, they are first prompted to authenticate. Upon wallet creation, the user is fully authenticated and can complete purchases quickly without providing billing information with every purchase.
摘要:
A system and method for electronic wallet conversion allows conversion of a basic electronic wallet to a more flexible wallet account, providing additional services and requiring additional authentication. The basic accountholder eventually requires the additional services provided by the more flexible wallet, typically editing rights and making purchases at sites requiring authentication beyond the basic level. To convert the account, the account holder is presented with a one-time challenge and response mechanism that requires the accountholder to summon information that only the account holder would know. If a successful match is made, the account is converted to the more flexible account for all time. The accountholder replaces the one-time challenge and response with a second-level password that grants the accountholder ongoing access to more sensitive wallet features, such as the ability to purchase at sites requiring a second-level password, and editing rights to the information stored in the wallet.
摘要:
A system and method for electronic wallet conversion allows conversion of a basic electronic wallet to a more flexible wallet account, providing additional services and requiring additional authentication. The basic accountholder eventually requires the additional services provided by the more flexible wallet, typically editing rights and making purchases at sites requiring authentication beyond the basic level. To convert the account, the account holder is presented with a one-time challenge and response mechanism that requires the accountholder to summon information that only the account holder would know. If a successful match is made, the account is converted to the more flexible account for all time. The accountholder replaces the one-time challenge and response with a second-level password that grants the accountholder ongoing access to more sensitive wallet features, such as the ability to purchase at sites requiring a second-level password, and editing rights to the information stored in the wallet.
摘要:
A system and method for electronic wallet conversion allows conversion of a basic electronic wallet to a more flexible wallet account, providing additional services and requiring additional authentication. The basic accountholder eventually requires the additional services provided by the more flexible wallet, typically editing rights and making purchases at sites requiring authentication beyond the basic level. To convert the account, the account holder is presented with a one-time challenge and response mechanism that requires the accountholder to summon information that only the account holder would know. If a successful match is made, the account is converted to the more flexible account for all time. The accountholder replaces the one-time challenge and response with a second-level password that grants the accountholder ongoing access to more sensitive wallet features, such as the ability to purchase at sites requiring a second-level password, and editing rights to the information stored in the wallet.
摘要:
A system and method for electronic wallet conversion allows conversion of a basic electronic wallet to a more flexible wallet account, providing additional services and requiring additional authentication. The basic accountholder eventually requires the additional services provided by the more flexible wallet, typically editing rights and making purchases at sites requiring authentication beyond the basic level. To convert the account, the account holder is presented with a one-time challenge and response mechanism that requires the accountholder to summon information that only the account holder would know. If a successful match is made, the account is converted to the more flexible account for all time. The accountholder replaces the one-time challenge and response with a second-level password that grants the accountholder ongoing access to more sensitive wallet features, such as the ability to purchase at sites requiring a second-level password, and editing rights to the information stored in the wallet.
摘要:
A system and method for electronic wallet conversion allows conversion of a basic electronic wallet to a more flexible wallet account, providing additional services and requiring additional authentication. The basic accountholder eventually requires the additional services provided by the more flexible wallet, typically editing rights and making purchases at sites requiring authentication beyond the basic level. To convert the account, the account holder is presented with a one-time challenge and response mechanism that requires the accountholder to summon information that only the account holder would know. If a successful match is made, the account is converted to the more flexible account for all time. The accountholder replaces the one-time challenge and response with a second-level password that grants the accountholder ongoing access to more sensitive wallet features, such as the ability to purchase at sites requiring a second-level password, and editing rights to the information stored in the wallet.
摘要:
A computer system configured to intercept method calls placed on an object. By intercepting method calls, processing may be performed on a method call-by-method call basis. As part of the processing, metadata for an object is consulted to partition the methods for that object into subsets. The processing performed in response to any specific method call may be based on the subset to which the method belongs. The type of metadata may depend on the desired operation of the computer system. Metadata representing a white list or black list may be used in a computer system that implements a security zone that allows access to methods deemed to be safe or to deny access to methods deemed to be unsafe. In a performance monitoring system, metadata may identify methods to be logged or methods for which execution cost are to be measured. Values returned by a method call may also be processed when the method calls are intercepted. The returned value may be wrapped with a wrapper that holds data useful in implementing a security zone or for performing other processing.
摘要:
Presented herein are methods, apparatuses, programs, and systems for scoring a player performance comprising one or more poses in a dance-based video game. a performance 3D skeleton is received that indicates a pose of the player. A score is calculated by comparing a position, a timing, or both, associated with one or more joints of the performance 3D skeleton to a position, a timing, or both, associated with one or more joints of a target pose and altering one or more characteristics of the dance-based video game based on the score.
摘要:
Presented herein are methods, apparatuses, programs, and systems for scoring a player performance comprising one or more poses in a dance-based video game. a performance 3D skeleton is received that indicates a pose of the player. A score is calculated by comparing a position, a timing, or both, associated with one or more joints of the performance 3D skeleton to a position, a timing, or both, associated with one or more joints of a target pose and altering one or more characteristics of the dance-based video game based on the score.
摘要:
Disclosed is a method for obtaining access to a relatively inaccessible region of a blood vessel for diagnostic or therapeutic purposes in which a primary catheter tube is inserted into the vascular system at an entry point remote from the relatively inaccessible region, the leading end of the tube is worked towards the inaccessible region in a conventional manner and then a secondary catheter tube contained within the primary tube is everted from the leading end of the primary tube to approach more closely to the required region. A catheter assembly for performing the method is also disclosed.