Exchanging
goods over the internet - System
and method of conducting on-line auctions - System
and methods for providing a health care industry trade show via
internet - Managing
credit inquiries within account receivables - Formulating
an investment strategy for real estate investments - Evaluating
long-term average portfolio risk and return for cyclical corporation
- Conducting
a financial analysis - Multi-note
method and system for loans based upon lease revenue stream - Secure
distribution of software/data - Indicator
system for screening protected material - Contents
managing method and contents managing apparatus - Certifying
public keys used to sign postal indicia and indicia so signed -
The
authentication of integrated circuits - Alternative
encryption techniques
Method of exchanging goods over the internet
A method and system is taught for coordinating the exchange of
goods between parties over a communications network such as the
internet. Users of the system can interact with a central computer
to input data regarding items that they offer for exchange, as
well as search criteria describing items that they would like to
receive in exchange. A processor in the central computer searches
records stored in a database to find and sort those records that
satisfy the user's search criteria. A second test is then be
performed to determine whether the information that the user input
describing the item offered for exchange satisfies search criteria
within the record. As a result, a match may be generated between
two users who have input complementary criteria. The invention can
also accommodate more complex exchanges between three or more
parties.
Moore, Donna R.
January 25, 02005
#6847938
System and method of conducting on-line auctions
A system for conducting on-line auctions of products is
disclosed. The system comprises (a) a database server system being
for storing and providing on demand, information pertaining to a
plurality of products to be auctioned, the database server system
further being for receiving a number of bids on a product of the
plurality of products when the product is auctioned, the number of
the bids received being for determining a quantity of the product
auctioned; and (b) a plurality of user clients each being operable
by a specific user and each being for establishing communication
with the database server system, each of the plurality of user
clients being for receiving from the database server system
information pertaining to the product auctioned and for relaying
to the database server system a bid on the product auctioned.
Shemesh, Yair
Olsale.com Ltd.; January 25, 02005
#6847939
System and methods for providing a health care industry trade
show via internet
This invention will serve as a new worldwide platform for
"business-to-business" and
"business-to-participants" tradeshows occurring in the
healthcare industry via the Internet 24 hours a day. One
embodiment of the invention is a system or method for providing a
healthcare industry trade show via internet including at least one
personal or network computer for collecting, assembling, storing,
correlating, or otherwise processing information desired by a
participant of the healthcare industry, and at least one other
computer used by the participant of the healthcare industry
connected via internet or intranet to conduct transactions with
other participants or exhibitors of the healthcare industry trade
show. Another embodiment includes at least one of the
communication vehicles to be used at the option of the participant
of the healthcare industry. Another embodiment provides optional
features including a booth with multiple rooms; a tradeshow
Concierge; instant audio and/or video announcements via eLERTS;
direct selling via detailing; a Pop-Up system of interaction with
experts and Attendees on the convention floor; opportunities for
participants to gain insights into treatment via presentation of
case reports; the use of special advisory panels assessing the
needs of participants and create education programs.
Shelton, John S.; Brown, H. Stephen
January 25, 02005
#6847940
Method and apparatus for managing credit inquiries within account
receivables
The Accounts Receivable System's Credit Inquiry Module reviews
payment history and performs credit inquiries by analyzing data
from internal and external sources. The Credit Inquiry Module uses
this analysis for credit management and customer contact. The
Credit Inquiry Module based on customer payment data predicts
overall cash forecasting for the client. The Credit Inquiry Module
is utilized for account reconciliation and audit verification for
tracking transactions at the customer level.
Land, David MacLeod; Getgood, Alan Bruce
General Electric Canada Equipment Finance G.P.; January 25, 02005
#6847942
Method for formulating an investment strategy for real estate
investments
The method discloses a rule-based decision process which
formulates an investment strategy in terms of short term debt,
long term debt, short term equity, and/or long term equity for a
variety of property types and geographic markets. The first phase
of the method achieves a visual representation of the condition of
each of a selected territory's major markets, showing market
direction and volatility determined on the basis of commercially
available market research data which has been adjusted by the
investing entity in light of actual local experience in the
market. The second phase deals with the implications of the first
phase results on four possible alternative investment types,
namely, short term debt, long term debt, short term equity, and/or
long term equity. This is accomplished by formulating a set of
decision rules which enable the individual investors of the
investing entity to uniformly evaluate specific types of
investment for each property type in a respective market area. The
result is again graphically portrayed so that the investing entity
can easily formulate an actionable real estate investment strategy
expressed in terms of investment types (namely, short term debt,
long term debt, short term equity, and/or long term equity), for
each market/property pair.
Dubner, Peter H.
G. E. Capital Corporation; January 25, 02005
#6847943
Method of evaluating long-term average portfolio risk and return
for cyclical corporation
A method of evaluating long-term average portfolio risk and
return for a cyclical corporation includes the steps of obtaining
historical pricing information for financial instruments used for
a relevant historical period and dividing the relevant historical
period up into time segments. The method also includes calculating
a gain or loss for each financial instrument in a portfolio for
the time segments over the relevant historical period and
obtaining actual cash level for each time segment and dividing up
the actual cash level of the corporation between asset classes to
determine what the portfolio is invested in. The method further
includes the steps of determining an average return and risk for a
typical one of the time segments over the historical period and
using an optimization framework to pick out the most efficient
portfolios in risk versus return.
Tosh, Dennis Alan; Everson, Mark Paul
Ford Global Technologies, LLC; January 25, 02005
#6847944
Method for conducting a financial analysis
A method is disclosed for conducting a financial analysis. The
method includes creating a financial analysis utility having a
standardized format, and providing access through a communication
network to the financial analysis utility to employees of a
business enterprise. Thus, the present invention provides a single
source for the financial analysis utility.
Jarvis, Colin; Wakefield, Daphne; Haag, Janis;
Thai-Tang, Nam; Wajroch, Manfred; Przybocki, Peter; Lougovier,
Serguei A.; Mei, Michael R.
Ford Motor Company; January 25, 02005
#6847945
Multi-note method and system for loans based upon lease revenue
stream
A method, system and program product for creating a loan from a
revenue stream from a lessee, the method comprising the steps of:
determining a revenue stream from a lease of a leased tangible
asset; calculating a Breakeven TA Note Rate, and a TA Note Amount
for a TA Note based on a Multi-Note Loan Coupon, a TA Note Debt
Service and market determined underwriting parameters for the
tangible asset; calculating an CL Note Debt Service after the TA
Note debt service, and other appropriate amounts, if necessary are
subtracted from the revenue; calculating a Breakeven CL Note Rate
and a CL Note Amount for a CL Note based on the calculated CL Note
Debt Service, the Multi-Note Loan Coupon, a CL Note Debt Service,
and market determined underwriting parameters; creating a file
structure of one or more files for the TA Note and the CL Note;
and associating the TA Note and CL Note to assign priorities for
purposes of determining and distributing recoveries to holders of
the TA Note and/or the CL Note and/or their designees in the event
of a Multi-Note Loan default and allocating the rights and
responsibilities of the holders of such notes. In a preferred
embodiment, the Multi-Note Loan Coupon is initially an estimated
value.
Blanz, Robert Charles; Gartner, Robert James
Capital Lease Funding LLC; January 25, 02005
#6847946
Method and apparatus for secure distribution of software/data
A method and apparatus is disclosed for preventing an
unauthorized computer system from using copied software or data.
An identification code provided by a client computer is combined
with a pre-determined number provided by the source of software or
data to be copied to generate at least one unique encryption key.
Prior to each use the encrypted program re-derives the original
encryption key, which includes the identification code of the
client computer, to decrypt the critical files prior to use. The
identification code may be a unique identifier associated with the
client computer such as a network identifier or a processor ID
provided by the client computer.
Paolini, Michael A.; Dutta, Rabindranath
International Business Machines Corporation; January 25, 02005
#6847948
Indicator system for screening protected material
Copy-protected content material is screened for an indication
of the availability of an enhanced version of a screening system
and forcing an upgrade to the advanced screening system by
refusing to process the copy-protected content material until the
upgrade is preformed. When security standards change, and
corresponding security techniques are available for downloading to
existing consumer devices, newly published content material will
contain an indication to that effect. When the newly published
content material is processed by an existing consumer device, the
consumer device will detect this indication of an available
update, and will prevent the processing of this newly published
content material until the update is received. In this manner, a
phased approach to enhanced security can be effected.
Epstein, Michael
Koninklijke Philips Electronics N.V.; January 25, 02005
#6847949
Contents managing method and contents managing apparatus
A contents managing method of regulating a number of copied
contents storable on a storage medium includes giving a
predetermined number of copyable contents for each content,
recording the copied contents on the storage medium upon reception
of an instruction for copy recording on the storage medium when
there is a remainder in the number of copyable contents,
decrementing the number of copyable contents by "1"
every time one copied content is recorded on the storage medium at
a time of recording, and incrementing the number of copyable
contents by "1" every time one copied content is erased
from the storage medium upon reception of an instruction to erase
the copied contents from the storage medium.
Kamibayashi, Toru; Tamura, Masafumi; Kato, Taku;
Ishibashi, Yasuhiro; Yamada, Hisashi; Toma, Hideyuki
Kabushiki Kaisha Toshiba; January 25, 02005
#6847950
Method for certifying public keys used to sign postal indicia and
indicia so signed
A method for certifying the public key of a digital postage
meter using a public key encryption system by a certifying
authority. A certifying station and a user station, or a digital
postage meter, exchange information and the user station and
downloads, or the meter derives, a public key from the exchanged
information. The certifying station also publishes related
information and its public key. A third party can derive the
public key corresponding to the meter's private key by operating
on the published information with the certifying station public
key.
Cordery, Robert A.; Pintsov, Leon A; Vanstone,
Scott A
Pitney Bowes Inc.; January 25, 02005
#6847951
Method and apparatus for the authentication of integrated
circuits
A method for the authentication of an integrated circuit in an
application system comprises, for the integrated circuit:
detecting an activation scenario, and then modifying at least one
of its responses. The application system implements an application
program which sends instructions to the integrated circuit. The
activation scenario is contained in the sequence of instructions
received from the application program. The modification causes no
malfunction of the integrated circuit in the application system,
and therefore does not put the integrated circuit out of
operation. A complementary method for the application system
comprises: detecting an activation scenario; measuring the
response of the integrated circuit to the activation scenario;
verifying the response if it has been modified correctly by the
integrated circuit; and authenticating the integrated circuit if
the response is verified.
Tailliet, Francois
STMicroelectronics S.A.; January 25, 02005
#6848049
System and method for alternative encryption techniques
A system and method for verifying the identification of a user
and securely establishing an encryption key for a communication
between the user and a verifying entity, such as a bank, which
makes use of the numeric value of the user's personal
identification number (PIN) known only to the user and the bank
and resolves the man-in-the-middle problem. The system and method
replaces a public parameter with the customer's PIN to provide an
encryption mechanism that is less complex than existing protocols.
Use of the protocol enables new products and improvement of
existing products using a service access device and service access
device interface, including, for example, self-service terminals.
Merman, Michael; Smushkovich, Yosif
Citicorp Development Center, Inc.; January 25, 02005
#6848050
Patent Alert
|