Abstract:
According to some embodiments, information about a first enterprise having a first fleet of vehicles is used to create a first customer interface to receive ride requests from customers via at least one communication network. Similarly, information about a second enterprise (located geographically remote from the first enterprise) having a second fleet of vehicles is used to create a second customer interface. An affiliate link may be established between the first enterprise and the second enterprise. When a ride request is received via the first customer interface, and it is determined that the first customer is located geographically proximate to the second enterprise, it may be arranged for a vehicle from the second fleet to be assigned to the request based on the affiliate link between the first enterprise and the second enterprise.
Abstract:
Embodiments of the present invention relate generally to methods and systems for validating location information and more particularly to validating an address associated with a communication identifier such as a telephone number which can be used, for example, to handle an emergency call placed from that telephone number. Generally speaking, embodiments of the present invention can include a validation process for location information received during registration of a subscriber of a communication service. The registration information can comprise a telephone number and an address. In one example, the received address can comprise a United States Postal Service (USPS) standard address while the validated address can comprise a Master Street Address Guide (MSAG) valid address.
Abstract:
A system and method for managing a value of a descending register of a postal security device (PSD) in accordance with a guarantee is disclosed. Mailing data including a guarantee rate, and a public rate of postage disbursed for a mailpiece franked under terms of the guarantee, can be received. The public rate and the guarantee rate can be compared, and if the public rate is equal to or less than the guarantee rate, postage funds can be downloaded from an account corresponding to a lessee of the PSD.
Abstract:
Methods and systems for electronic document authentication are disclosed. In one aspect, a method of generating an electronic postmark includes receiving, via a server, a request message from an electronic network, the request message comprising request data including payload data and meta data, generating a timestamp in response to receiving the message, hashing the payload data to generate a payload hash, digitally signing the metadata, the payload hash, and the timestamp to generate a digital signature, generating a response message, the response message generated to comprise the metadata, the payload hash, the timestamp, and the digital signature; and transmitting the response message onto the electronic network.
Abstract:
A database includes one or more physical location identifiers such as postal addresses, delivery or street addresses, or geographic coordinates. A correlator correlates electronic addresses with physical location identifiers. The correlated electronic addresses can incorporate part or all of the corresponding physical location identifier. The correlated electronic addresses can further incorporate a reference to an individual, such as a name or title, or a reference to a group of individuals, such as by name. Correlated electronic addresses allow reception of electronic communication. Services offered with electronic delivery of correspondence to correlated electronic addresses include return receipt, insured delivery, certified delivery, forwarding, non-delivery notification, and non-electronic delivery. Costs associated with operation of the electronic mail may be covered by administration of postage or when the recipient elects electronic delivery of correspondence traditionally delivered by paper mail.
Abstract:
Systems and methods of processing items. Items in a distribution network or process may be scanned at every handling point in the distribution network, and each scan is recorded in a central repository. The scan information can be used to generate real-time access to data, analytical tools, predictive tools, and tracking reports.
Abstract:
Systems and methods of processing items. Items in a distribution network or process may be scanned at every handling point in the distribution network, and each scan is recorded in a central repository. The scan information can be used to generate real-time access to data, analytical tools, predictive tools, and tracking reports.
Abstract:
A system and method for providing a variety of medium access and power management methods are disclosed. A defined frame structure allows a hub and a node to use said methods for secured or unsecured communications with each other. Contended access is available during a random access phase. The node uses an alternate doubling of a backoff counter to reduce interference and resolve collisions with other nodes attempting to communicate with the hub in the random access phase. Non-contended access is also available, and the hub may schedule reoccurring or one-time allocation intervals for the node. The hub and the node may also establish polled and posted allocation intervals on an as needed basis. The node manages power usage by being at active mode at times during the beacon period when the node is expected to transmit or receive frames.
Abstract:
Method of Obtaining Optimized Use Case for Communication Network A method of obtaining an optimized combination of use cases for a communication network is disclosed. The method includes presenting on a display device a set of objectives, wherein at least one communication network indicator is associated with the set of objectives, and each of the set of objectives is measurable by a set of key performance indicator (KPI)s; receiving a selection to one or more objectives from the presented set of objectives through an input device; outputting a first optimized combination of use cases having the most positive impact to KPIs of the selected set of objectives; and presenting on the display the optimized use cases combination.
Abstract:
A method is provided in one example and includes receiving data from a mobile network entity, parsing the data to determine a first identity and first attribute information associated with the first identity, determining whether the first identity exists in a database, storing the first identity in the database if the first identity does not exist in the database, and storing the first attribute information in association with the first identity in the database. The method further includes determining whether there is at least one identity related to the first identity in the database, and updating each of the related identities with the first attribute information when it is determined that there is at least one identity.