Abstract:
Methods and apparatus to provide an electronic agent are disclosed. An example method includes receiving an interactive program via a network at a first information presenting device, accessing a list of keywords associated with the interactive program via the network, accessing a first database using at least one of the keywords, and presenting an electronic agent on the first information presenting device to at least one of present information retrieved from the first database or offer to retrieve information identified via the first database.
Abstract:
Methods and apparatus to provide an electronic agent are disclosed. An example method includes receiving an interactive program via a network at a first information presenting device, accessing a list of keywords associated with the interactive program via the network, accessing a first database using at least one of the keywords, and presenting an electronic agent on the first information presenting device to at least one of present information retrieved from the first database or offer to retrieve information identified via the first database
Abstract:
A change management system coordinates information of a transaction tool managed by a transaction tool management system. The system includes a receiver that receives, over a communications network, activity information and/or lifecycle event information for the transaction tool. The system also includes a storage that stores the received information. Additionally, the system includes a processor that manages a change in a status of the transaction tool based on the received information.
Abstract:
A system is provided for verifying an identity of a calling party. The system includes a storage that stores voice sample information in association with information that identifies an individual. The system also includes a receiver that receives, from a communications platform called by the calling party, a request to authenticate the identity of the calling party as the individual, using a digital audio sample packetized according to voice over internet protocol and obtained from the calling party during the call. Additionally, the system includes a processor that compares the digital audio sample to the voice sample information to authenticate the identity of the calling party as the individual.
Abstract:
Electronic coupon systems and methods to operate the same are disclosed. A disclosed example coupon management system includes a processor to determine an applicable coupon for an item to be purchased, and a network interface to receive a coupon selection from a remotely located user device, and to send the coupon to a remotely located point-of-sale terminal, wherein the point-of-sale terminal is to identify the item to be purchased and to apply the identified coupon to the item to be purchased.
Abstract:
A centralized biometric system is provided for verifying an individual's identity over a communications network. The centralized biometric system includes a receiver that receives, from a remote communications system, a biometric sample from a party attempting to obtain a service using the remote communications system. The service is provided contingent on authentication of the party as the individual. The system also includes a processor that compares the biometric sample to biometric information obtained from a storage to authenticate the identity of the party as the individual. The receiver and the processor are within a centralized system in the communications network.
Abstract:
A centralized biometric system is provided for verifying an individual's identity over a communications network. The system includes a storage that stores biometric information in association with information that identifies an individual. The system also includes a receiver that receives, from one of a communications device and a network communications platform, a biometric sample from a party attempting to obtain a service from the one of the communications device and the network communications platform. The service is provided contingent on authentication of the party as the individual. The system also includes a processor that compares the biometric sample to the biometric information to authenticate the identity of the party as the individual.
Abstract:
Email can be securely stored using a secure record management system. An encrypted email is received at the secure record management system. The received email is a duplicated copy of a transmitted email and is decryptable by the secure record management system. The received email is processed and providing to an archive for archiving.
Abstract:
A system and method are disclosed for providing access to an interactive service offering. A method incorporating teachings of the present disclosure may include receiving a first communication in a format that complies with a first protocol. The first communication may be associated with a desired interaction between a first device and a voice activated service (VAS) platform. The method may also include receiving a second communication in a different format that complies with a different protocol, and the second communication may also be associated with a desired interaction between a different device and the VAS platform. A system implementing the method may recognize that the VAS platform does not support the first protocol, and translate the first communication to a platform-supported format to facilitate the desired interaction.
Abstract:
A pectoral implant is disclosed of a soft silicone material that is contoured to the chest of a male. The implant is split partway therethrough so that it can be folded and inserted into a small slit under the armpit of a male and moved into the chest area to simulate the built-up chest appearance of the male.