Abstract:
A system and system for personal pathogen status verifying allows an entity to control access to an area of congregation (AOC) at one or more points of entry (POE) is a configurable manner. In one embodiment, the system may be used for the SARS-CoV-2 virus, but may be similarly used for other pathogens.
Abstract:
A system and method are provided for real-time call control. When a call is received at a telephone server for a service subscriber, the server identifies the subscriber and retrieves information that will allow the server to contact the subscriber via instant messaging. An instant message is sent to the subscriber, and includes any number of options for controlling or handling the call. The options may be presented as hyperlinks, or the selected option may be returned in another instant message. The subscriber selects an option and communicates it to the server, which effects the selected option. The server may establish an audio connection between the server and the subscriber's computer or communication device (to allow the parties to talk), may transfer the call to another number, play a message for the caller (which may be pre-recorded or recorded in real-time), record a voicemail (which the subscriber may screen), etc.
Abstract:
A system and method are provided for real-time call control. When a call is received at a telephone server for a service subscriber, the server identifies the subscriber and retrieves information that will allow the server to contact the subscriber via instant messaging. An instant message is sent to the subscriber, and includes any number of options for controlling or handling the call. The options may be presented as hyperlinks, or the selected option may be returned in another instant message. The subscriber selects an option and communicates it to the server, which effects the selected option. The server may establish an audio connection between the server and the subscriber's computer or communication device (to allow the parties to talk), may transfer the call to another number, play a message for the caller (which may be pre-recorded or recorded in real-time), record a voicemail (which the subscriber may screen), etc.
Abstract:
A system and system for personal pathogen status verifying allows an entity to control access to an area of congregation (AOC) at one or more points of entry (POE) is a configurable manner. In one embodiment, the system may be used for the SARS-CoV-2 virus, but may be similarly used for other pathogens.
Abstract:
A system and method for settling monetary and quota-allocated dual currency transactions may be used to reduce Co2 emissions. Each purchasable item (product or service) in the system may have a monetary price and a Carbon price whose value corresponds to a number of Kg of Co2 emitted by the manufacture/sale/use of the purchasable item. The system and method individualizes the reduction of Co2 emissions and allows each consumer to choose purchasable items in part based on the Carbon price.
Abstract:
A method and apparatus for automatically charging an electrically powered vehicle are provided. The apparatus comprises a sensor for sensing proximity or presence of the vehicle, and one or more chargers for automatically coupling with corresponding receptacles of the vehicle and charging an onboard electrical storage device (e.g., a battery). The vehicle may be driven to or parked in a position that automatically couples the apparatus and vehicle as needed, or the apparatus may include locomotion means (e.g., wheels, tracks, rails) for moving along one or more axes of movement. The degree of coupling may depend on the type of charger to be engaged—such as direct contact for conductive and inductive chargers, or close proximity for a near-field charger. The apparatus may also include manual controls for moving/operating the apparatus, a processor for controlling operation of any element(s) of the apparatus, and/or other components.
Abstract:
In general, embodiments of the present invention provide systems, methods and computer readable media for controlling access to an electronic account. In some embodiments, a method includes receiving, at a server computer and from an electronic account provider computer, a notification pertaining to an electronic account belonging to a user. The method also includes, sending, via the server computer, an authorization request to the user. The method further includes receiving, a response to the authorization request sent to the user. The method additionally includes authenticating the user based at least in part on the received response to the authorization request. The method also includes granting the user access to the electronic account based at least in part on the authenticating step.
Abstract:
A method and apparatus for enhanced browsing with security scanning. Within a document (e.g., a web page, a word processing document, a list of electronic mail messages), a link to other content or another document is selected by a computing device and the content is identified before a user clicks on the link to open the content. The content is placed into a safe cache that prevents the content from adversely affecting the user's computing device. The content is scanned and/or its behavior is analyzed to detect any security threats or undesirable content (e.g., viruses, worms, scripts, adware, spyware, pornography). Results of the analysis may be collected at a central server. The link or an associated indicator may be configured to indicate whether a threat is present; more information may be provided as desired. A user may be provided with various options to ignore a threat, disable the link, etc.
Abstract:
A method and apparatus for look-ahead security. Within a document (e.g., a web page, a word processing document, a list of electronic mail messages), a link to other content or another document is selected and the content is identified before a user clicks on the link to open the content. The content is placed into a safe cache that prevents the content from adversely affecting the user's computing device. The content is scanned and/or its behavior is analyzed to detect any security threats or undesirable content (e.g., viruses, worms, scripts, adware, spyware, pornography). Results of the analysis may be collected at a central server. The link or an associated indicator may be configured to indicate whether a threat is present; more information may be provided as desired. A user may be provided with various options to ignore a threat, disable the link, etc.