Patent application number | Description | Published |
20080215882 | Assigning Security Levels to a Shared Component - Security levels are assigned to a shared component. A workflow manager receives a workflow request that corresponds to a plurality of workflow steps. For each workflow step, the workflow manager determines whether the workflow step uses a shared component or an unshared component for execution. If the workflow step uses a shared component, the workflow manager invokes the step, and stores the step and its corresponding security level in a security tracking table. When the workflow manager encounters a shared component, the workflow manager uses the security tracking table entries in order to determine a security level to assign the shared component. The workflow manager assigns the determined security level to the shared component, and invokes the shared component to execute the corresponding process step. | 09-04-2008 |
20090299748 | MULTIPLE AUDIO FILE PROCESSING METHOD AND SYSTEM - An audio file generation method and system. A computing system receives a first audio file comprising first speech data associated with a first party. The computing system receives a second audio file comprising second speech data associated with a second party. The first audio file differs from the second audio file. The computing system generates a third audio file from the second audio file. The third audio file differs from the second audio file. The process to generate the third audio file includes identifying a first set of attributes missing from the second audio file and adding the first set of attributes to the second audio file. The process to generate the third audio file additionally includes removing a second set of attributes from the second audio file. The third audio file includes third speech data associated with the second party. The computing system broadcasts the third audio file. | 12-03-2009 |
20090310939 | SIMULATION METHOD AND SYSTEM - A simulation method and system. A computing system receives a first audio and/or video data stream. The first audio and/or video data stream includes data associated with a first person. The computing system monitors the first audio and/or video data stream. The computing system identifies emotional attributes comprised by the first audio and/or video data stream. The computing system generates a second audio and/or video data stream associated with the first audio and/or video data stream. The second audio and/or video data stream includes the data without the emotional attributes. The computing system stores the second audio and/or video data stream. | 12-17-2009 |
20090313015 | MULTIPLE AUDIO/VIDEO DATA STREAM SIMULATION METHOD AND SYSTEM - A multiple audio/video data stream simulation method and system. A computing system receives first audio and/or video data streams. The first audio and/or video data streams include data associated with a first person and a second person. The computing system monitors the first audio and/or video data streams. The computing system identifies emotional attributes comprised by the first audio and/or video data streams. The computing system generates second audio and/or video data streams associated with the first audio and/or video data streams. The second audio and/or video data streams include the first audio and/or video data streams data without the emotional attributes. The computing system stores the second audio and/or video data streams. | 12-17-2009 |
20100029304 | DATA TRANSMISSION METHOD AND SYSTEM - A data transmission method and system. The method includes transmitting by a first wireless communication device to a second wireless communication device, first voice data associated with a first user. The first wireless communication device receives from the second wireless communication device, a verbal request for receiving text data. The first wireless communication device retrieves the text data. The first wireless communication device generates a transaction data object comprising the text data and a command for executing an executable program for performing an action with respect to the text data on the second wireless communication device. The first wireless communication device simultaneously transmits second voice data and the transaction data object to the second wireless communication device. | 02-04-2010 |
20100073559 | VERBAL DESCRIPTION METHOD AND SYSTEM - A verbal description method and system. A computing system broadcasts first audio data and video data associated with the first audio data. The computing system determines that the video data comprises a graphic without a description in the first audio data. The computing system receives audible description data associated with the graphic. The computing system generates second audio data comprising the first audio data and the audible description data. The computing system synchronizes portions of the second audio data with associated portions of the video data. The computing system generates synchronized audio/video data comprising the portions of said second audio data aligned with the associated portions of said video data. The computing system broadcasts the synchronized audio/video data. | 03-25-2010 |
20100115583 | METHOD FOR FAULT-TOLERANT USER INFORMATION AUTHENTICATION - A method for user information authentication which includes setting user information for a user account, such user information being the set user information; inputting user information by a user for the user account into a device, such user information being the input user information; evaluating the input user information for correspondence with the set user information according to fault-tolerant user information rules, wherein such rules evaluate the input user information for content and closeness to the set user information and noting if the input user information is a valid user information, a fault-tolerant user information, or an invalid user information; authorizing access to the user account if the input user information is a valid user information. In one embodiment of the invention, the method includes incrementing an invalid user information counter only if the user information is an invalid user information. In another embodiment of the invention, the method includes providing a message to the user if the user information is a fault-tolerant user information, the message being descriptive of the input user information's correspondence with the fault tolerant user information rules. | 05-06-2010 |
20100131323 | TIME MANAGEMENT METHOD AND SYSTEM - Disclosed is a time management method which includes detecting a current activity of a user on a computer, classifying the current activity according to a predetermined characteristic, prioritizing the current activity according to a predetermined order of importance, and prompting the user to work on the highest important activity if not already working on it. Also disclosed is a computer readable storage medium storing instructions that, when executed by a computer, causes the computer to perform a method of time management, a computer program product and a system for time management. | 05-27-2010 |
20100145965 | PRESENTATION OF WEBSITES TO A COMPUTER USER - A method, computer readable storage medium, computer program product and a service. A profile of a computer user is obtained that contains meta tags descriptive of the participants of a first social networking website. A second social networking website having meta tags is selected. A profile from the second social networking website is selected. The meta tags of the first and second social networking websites are compared to determine if there is a match of at least one meta tag. Then, a search is made for related websites having at least one meta tag that matches the at least one meta tag. A list of the related websites is then presented to the computer user. | 06-10-2010 |
20100146606 | AUTHENTICATION METHOD AND SYSTEM - An authentication method and system. A computing system generates an authentication table associated with a user. The computing system receives first authentication data and second authentication data differing from the first authentication data. The first authentication data and the second authentication data are placed in the authentication table. The authentication table comprising the first authentication data and the second authentication data is stored in the computing system. The computing system generates an action table. The computing system receives first action data and second action data and places the first action data and the second action data in the action table. The action table comprising the first action data and the second action data is stored in the computing system. | 06-10-2010 |
20100242090 | USER AUTHENTICATION METHOD AND SYSTEM - A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing system enables a security manager software application and connects the specified software application to a computing apparatus. The computing system executes first security functions associated with the computing apparatus. The computing system executes second security functions associated with additional computing apparatuses. The computing system determines if the user may access the specified functions executed by the specified software application based on results of executing the first security functions and the second security functions. The computing system generates and stores a report indicating the results. | 09-23-2010 |
20120188446 | VERBAL DESCRIPTION - A verbal description method and system. A computing system broadcasts first audio data and video data associated with the first audio data. The computing system determines that the video data comprises a graphic without a description in the first audio data. The computing system receives audible description data associated with the graphic. The computing system generates second audio data comprising the first audio data and the audible description data. The computing system synchronizes portions of the second audio data with associated portions of the video data. The computing system generates synchronized audio/video data comprising the portions of said second audio data aligned with the associated portions of said video data. The computing system broadcasts the synchronized audio/video data. | 07-26-2012 |
20120213489 | SIMULATION METHOD AND SYSTEM - A simulation method and system. A computing system receives a first audio and/or video data stream. The first audio and/or video data stream includes data associated with a first person. The computing system monitors the first audio and/or video data stream. The computing system identifies emotional attributes comprised by the first audio and/or video data stream. The computing system generates a second audio and/or video data stream associated with the first audio and/or video data stream. The second audio and/or video data stream includes the data without the emotional attributes. The computing system stores the second audio and/or video data stream. | 08-23-2012 |
20120221243 | SHARING GPS NAVIGATION INFORMATION - A host application on a host computer system receives annotations made by drivers of respective navigation information displayed to the drivers by GPS devices in vehicles of the respective drivers. The host application saves the annotated navigation information for the respective drivers on a computer readable memory accessible by the host application. The host application receives a request from a first one of the drivers for annotated navigation information made by one or more of the other drivers. Responsive to the request, the host application selects one or more items of the saved annotated navigation information. The host application sends the selected one or more items of the saved annotated navigation information to the GPS device of the first one of the drivers. | 08-30-2012 |
20120239393 | MULTIPLE AUDIO/VIDEO DATA STREAM SIMULATION - A multiple audio/video data stream simulation method and system. A computing system receives first audio and/or video data streams. The first audio and/or video data streams include data associated with a first person and a second person. The computing system monitors the first audio and/or video data streams. The computing system identifies emotional attributes comprised by the first audio and/or video data streams. The computing system generates second audio and/or video data streams associated with the first audio and/or video data streams. The second audio and/or video data streams include the first audio and/or video data streams data without the emotional attributes. The computing system stores the second audio and/or video data streams. | 09-20-2012 |
20120246669 | MULTIPLE AUDIO/VIDEO DATA STREAM SIMULATION - A multiple audio/video data stream simulation method and system. A computing system receives first audio and/or video data streams. The first audio and/or video data streams include data associated with a first person and a second person. The computing system monitors the first audio and/or video data streams. The computing system identifies emotional attributes comprised by the first audio and/or video data streams. The computing system generates second audio and/or video data streams associated with the first audio and/or video data streams. The second audio and/or video data streams include the first audio and/or video data streams data without the emotional attributes. The computing system stores the second audio and/or video data streams. | 09-27-2012 |