Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US6006335A
Filed: 1996-12-07
Issued: 1999-12-21
Patent Holder: (Original Assignee) Samsung Electronics Co Ltd     (Current Assignee) Samsung Electronics Co Ltd
Inventor(s): Hyeong-Sik Choi, Dong-Ho Lee

Title: Power management system and method of displaying power management information in a computer

[FEATURE ID: 1] methodmeans, system, computerized, process, dynamic method, procedure, technique[FEATURE ID: 1] element, method
[TRANSITIVE ID: 2] disbursingtransmitting, sending, supplying, providing, delivering[TRANSITIVE ID: 2] generating
[FEATURE ID: 3] second partysystem, device, terminal, cpu, processor, screen, host[FEATURE ID: 3] monitor, computer, voltage, keyboard
[FEATURE ID: 4] first partymethod, system, customer, person, operator[FEATURE ID: 4] user
[TRANSITIVE ID: 5] transmitting, establishing, assigning, enteringobtaining, providing, receiving, identifying, generating, maintaining, storing[TRANSITIVE ID: 5] determining, controlling
[FEATURE ID: 6] server computer, service providerserver, computer, processor, host, network, machine, workstation[FEATURE ID: 6] computer system
[TRANSITIVE ID: 7] operatedprovided, used, arranged, established, equipped, implemented, located[TRANSITIVE ID: 7] installed, able
[TRANSITIVE ID: 8] coupledjoined, linked, belonging, related, adapted, coupling, attached[TRANSITIVE ID: 8] connected
[FEATURE ID: 9] databasemicroprocessor, receiver, system, monitor[FEATURE ID: 9] controller
[TRANSITIVE ID: 10] comprisingincluding, by, comprises, includes, having, involving, containing[TRANSITIVE ID: 10] comprising
[FEATURE ID: 11] steps, security levels, criteriacharacteristics, properties, values, attributes, parameters, additional steps, successive steps[FEATURE ID: 11] frequencies, steps
[FEATURE ID: 12] portionstypes, features, versions, levels[FEATURE ID: 12] modes
[FEATURE ID: 13] responseconnection, conformity, conformance, correlation, compliance, proportion, according[FEATURE ID: 13] response, accordance
[FEATURE ID: 14] first portionregion, segment, part, section[FEATURE ID: 14] location
[FEATURE ID: 15] criterionterm, key, function, condition[FEATURE ID: 15] time period
1 . A method [FEATURE ID: 1]

for automatically disbursing [TRANSITIVE ID: 2]

a first party ' s personal information to a second party [FEATURE ID: 3]

authorized by the first party [FEATURE ID: 4]

by transmitting [TRANSITIVE ID: 5]

said first party ' s personal information from a server computer [FEATURE ID: 6]

operated [TRANSITIVE ID: 7]

by a service provider [FEATURE ID: 6]

, said server computer coupled [TRANSITIVE ID: 8]

to a database [FEATURE ID: 9]

, the method comprising [TRANSITIVE ID: 10]

the steps [FEATURE ID: 11]

of : establishing [TRANSITIVE ID: 5]

an account for the first party with the server computer : assigning [TRANSITIVE ID: 5]

an identifier to the first party ; entering [TRANSITIVE ID: 5]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 11]

to each information object at any granularity , thereby enabling access to individually selected portions [FEATURE ID: 12]

of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response [FEATURE ID: 13]

to the request , selecting a first portion [FEATURE ID: 14]

of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information , recording the second party identifier ; and rejecting the second party ' s request for information . 2 . The method of claim 1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number of requests that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key ; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 11]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 15]

1 . A computer system [FEATURE ID: 6]

, comprising [TRANSITIVE ID: 10]

: a monitor [FEATURE ID: 3]

having a controller [FEATURE ID: 9]

installed [TRANSITIVE ID: 7]

therein for determining [TRANSITIVE ID: 5]

a plurality of different power save modes [FEATURE ID: 12]

of operation based on frequencies [FEATURE ID: 11]

of synchronization signals and for generating [TRANSITIVE ID: 2]

a mode control signal ; a computer [FEATURE ID: 3]

having a video card installed therein for generating video signals and said synchronization signals , a switching element [FEATURE ID: 1]

connected [TRANSITIVE ID: 8]

to the video card for controlling [TRANSITIVE ID: 5]

power supply of a predetermined voltage [FEATURE ID: 3]

in response [FEATURE ID: 13]

to the mode control signal ; and a luminous element , installed at a predetermined location [FEATURE ID: 14]

of a keyboard [FEATURE ID: 3]

and powered by the operation of said switching element , for providing a visual display of a display power management signaling mode for user selection of said plurality of different power save modes of operation , said plurality of different power save modes including at least a power - on mode , a first intermediate power mode , a second intermediate power mode , and a power - off mode , said first intermediate power mode requiring less power than said power - on mode and more power than said second intermediate power mode , said second intermediate power mode requiring more power than said power - off mode , wherein the user [FEATURE ID: 4]

is able [FEATURE ID: 7]

to select any power save mode from among said plurality of different power save modes . 2 . A computer system , comprising : a computer having a video card installed therein for generating video signals and synchronization signals ; and a monitor having a controller installed therein for determining a plurality of different power save modes of operation based on frequencies of said synchronization signals and generating a mode control signal , an on - screen display circuit for providing an on - screen display of a display power management signaling mode in accordance [FEATURE ID: 13]

with the video signals generated from the video card for user selection of said plurality of different power save modes of operation , said plurality of different power save modes including at least a power - on mode , a first intermediate power mode , a second intermediate power mode , and a power - off mode , said first intermediate power mode requiring less power than said power - on mode and more power than said second intermediate power save mode , said second intermediate power mode requiring more power than said power - off mode , wherein the user is able to select an power save mode from among said plurality of different power save modes . 3 . A method [FEATURE ID: 1]

of displaying a display power management signaling mode in a computer system , comprising the steps [FEATURE ID: 11]

of : providing an on - screen display of display power management signaling information while the computer system is in an operating system environment , in response to input of a display power management signaling mode for a predetermined time period [FEATURE ID: 15]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US6005939A
Filed: 1996-12-06
Issued: 1999-12-21
Patent Holder: (Original Assignee) International Business Machines Corp     (Current Assignee) Google LLC
Inventor(s): Keith Neil Fortenberry, Herman Rodriquez

Title: Method and apparatus for storing an internet user's identity and access rights to world wide web resources

[FEATURE ID: 1] methodprocedure, process, system, mechanism, means, methods, security method[FEATURE ID: 1] method, passport database
[TRANSITIVE ID: 2] disbursing, coupled, assigning, enteringcommunicating, transporting, routing, transferring, conveying, providing, serving[TRANSITIVE ID: 2] sending, comprising, interconnecting, transmitting
[FEATURE ID: 3] personal information, security levels, criteriadata, credentials, content, information, identity, profile, service[FEATURE ID: 3] profile data, passport, user, transaction, first data item, data item, form
[FEATURE ID: 4] second party, first party, service provider, second party ', criterionuser, first, computer, system, subscriber, server, customer[FEATURE ID: 4] first node, second node, data portion, computer server apparatus
[TRANSITIVE ID: 5] transmittingreceiving, storing, utilizing, using, providing, obtaining, employing[TRANSITIVE ID: 5] having, maintaining
[TRANSITIVE ID: 6] said, individualspecific, the, respective, particular, predetermined, relevant, only[TRANSITIVE ID: 6] corresponding
[FEATURE ID: 7] server computer, databaseserver, processor, router, host, client, system, firewall[FEATURE ID: 7] passport server node, network
[TRANSITIVE ID: 8] operatedlocated, maintained, established, held, installed, provided, hosted[TRANSITIVE ID: 8] stored
[TRANSITIVE ID: 9] comprisingincluding, comprises, includes, having, involving, by, providing[TRANSITIVE ID: 9] utilizing
[FEATURE ID: 10] stepsmethods, activities, successive steps, individual steps, method steps, actions, phases[FEATURE ID: 10] steps
[TRANSITIVE ID: 11] establishinglogging, registering, managing, holding, defining, providing, maintaining[TRANSITIVE ID: 11] storing
[FEATURE ID: 12] information objects, portions, parties, information, requests, timesrecords, pages, elements, persons, items, people, keys[FEATURE ID: 12] data, users, data portions, data items
[FEATURE ID: 13] information objectrecord, field, message, data, identifier, document[FEATURE ID: 13] data structure, request
[FEATURE ID: 14] granularitydate, size, duration, location[FEATURE ID: 14] key
[FEATURE ID: 15] first party identifier, security level, second party identifiertoken, password, security, key, identifier, record, permission[FEATURE ID: 15] security level
[FEATURE ID: 16] requestcommunication, signal, requirement, transaction, key, query, demand[FEATURE ID: 16] first request, message
[FEATURE ID: 17] personal information objectsdatabase, content, documents, information[FEATURE ID: 17] first passport
[FEATURE ID: 18] claimpreceding claim, figure, step, invention, clause, embodiment, paragraph[FEATURE ID: 18] claim
1 . A method [FEATURE ID: 1]

for automatically disbursing [TRANSITIVE ID: 2]

a first party ' s personal information [FEATURE ID: 3]

to a second party [FEATURE ID: 4]

authorized by the first party [FEATURE ID: 4]

by transmitting [TRANSITIVE ID: 5]

said [TRANSITIVE ID: 6]

first party ' s personal information from a server computer [FEATURE ID: 7]

operated [TRANSITIVE ID: 8]

by a service provider [FEATURE ID: 4]

, said server computer coupled [TRANSITIVE ID: 2]

to a database [FEATURE ID: 7]

, the method comprising [TRANSITIVE ID: 9]

the steps [FEATURE ID: 10]

of : establishing [TRANSITIVE ID: 11]

an account for the first party with the server computer : assigning [TRANSITIVE ID: 2]

an identifier to the first party ; entering [TRANSITIVE ID: 2]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 12]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 3]

to each information object [FEATURE ID: 13]

at any granularity [FEATURE ID: 14]

, thereby enabling access to individually selected portions [FEATURE ID: 12]

of the first party ' s personal information by individual [FEATURE ID: 6]

receiving parties [FEATURE ID: 12]

; storing in the database the first party identifier [FEATURE ID: 15]

, the information object and the security level [FEATURE ID: 15]

assigned to the information object ; receiving a request [FEATURE ID: 16]

, said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects [FEATURE ID: 17]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier [FEATURE ID: 15]

; if the second party is not authorized to receive the information [FEATURE ID: 12]

, recording the second party identifier ; and rejecting the second party ' [FEATURE ID: 4]

s request for information . 2 . The method of claim [FEATURE ID: 18]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number of requests [FEATURE ID: 12]

that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key ; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 3]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 4]

to indicate the number of times [FEATURE ID: 12]

1 . A method [FEATURE ID: 1]

of sending [TRANSITIVE ID: 2]

data [FEATURE ID: 12]

from a first node [FEATURE ID: 4]

to a second node [FEATURE ID: 4]

utilizing [TRANSITIVE ID: 9]

a passport server node [FEATURE ID: 7]

having [TRANSITIVE ID: 5]

a plurality of passports stored [TRANSITIVE ID: 8]

therein , a network [FEATURE ID: 7]

comprising [TRANSITIVE ID: 2]

and interconnecting [TRANSITIVE ID: 2]

the first , second and passport server nodes , each of the plurality of passports having a data portion [FEATURE ID: 4]

, a security level [FEATURE ID: 15]

, and a key [FEATURE ID: 14]

, the method comprising the steps [FEATURE ID: 10]

of : maintaining [TRANSITIVE ID: 5]

a passport database [FEATURE ID: 1]

for storing [TRANSITIVE ID: 11]

profile data [FEATURE ID: 3]

for each of a plurality of users [FEATURE ID: 12]

in a data structure [FEATURE ID: 13]

comprising the passport [FEATURE ID: 3]

for the corresponding [TRANSITIVE ID: 6]

user [FEATURE ID: 3]

, the first node corresponding to a first of the users and to a first of the passports : transmitting [TRANSITIVE ID: 2]

a first request [FEATURE ID: 16]

from the first node to the second node for a transaction [FEATURE ID: 3]

with the second node ; transmitting a public key from the first node to the second node , the public key having been previously provided by the passport server node to the first node ; transmitting an encrypted message [FEATURE ID: 16]

from the first node to the passport server node wherein the encrypted message directs the passport server node to transmit the first passport [FEATURE ID: 17]

stored in the passport server node to the second node ; transmitting the first passport from the passport server node to the second node ; and if the data portion of the transmitted first passport is encrypted , the second node decodings via the public key transmitted from the first node to the second node , the data portion of the the first passport so as to use the data portion for the transaction with the first node . 2 . The method of claim [FEATURE ID: 18]

1 further comprising the steps of : receiving the encrypted message in the passport server node ; and decrypting the encrypted message in the passport server node . 3 . The method of claim 2 A ) wherein each of the data portions [FEATURE ID: 12]

of the passports includes one or more data items [FEATURE ID: 12]

comprising profile data , and each of the passports has a security level associated with each of the data items ; B ) wherein the message decrypting step includes the step of : extracting a request [FEATURE ID: 13]

for a first data item [FEATURE ID: 3]

comprising the requested data item [FEATURE ID: 3]

from the encrypted message ; and C ) wherein the determining step includes the step of : responsive to the decrypted message , and based at least in part on the security level of requested data item , the passport server node determining whether the requested data item of the data portion of the first passport should be transmitted to the second node in encrypted form [FEATURE ID: 3]

, and , if so , encrypting the data portion . 4 . A computer server apparatus [FEATURE ID: 4]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US6003131A
Filed: 1996-03-20
Issued: 1999-12-14
Patent Holder: (Original Assignee) Samsung Electronics Co Ltd     (Current Assignee) Samsung Electronics Co Ltd
Inventor(s): Sang-jin Lee, Kyong-kyu Lee

Title: Computer system with a variety of applications and method for operating the same

[TRANSITIVE ID: 1] disbursing, assigning, enteringtransmitting, providing, sending, transferring, delivering, distributing, conveying[TRANSITIVE ID: 1] communicating
[FEATURE ID: 2] personal information, authorization keyaccess, information, response, data, input, output, identity[FEATURE ID: 2] output peripherals
[FEATURE ID: 3] second partyterminal, device, system, source, unit, controller, module[FEATURE ID: 3] power supply, switch circuit
[TRANSITIVE ID: 4] transmitting, establishingreceiving, providing, supporting, operating, having, setting, generating[TRANSITIVE ID: 4] supplying, selecting, storing
[FEATURE ID: 5] server computercomputer, processor, network, system[FEATURE ID: 5] bus
[TRANSITIVE ID: 6] coupledrelated, linked, associated, adapted, joined, coupling, attached[TRANSITIVE ID: 6] coupled
[FEATURE ID: 7] databasekeyboard, storage, display, microprocessor, system, bus, network[FEATURE ID: 7] memory
[TRANSITIVE ID: 8] comprisingincluding, containing, executing, has, providing, incorporating, consisting[TRANSITIVE ID: 8] comprising, obtaining
[FEATURE ID: 9] stepsfunctions, actions, procedures, methods, the, information, drivers[FEATURE ID: 9] operation, application routines, instructions
[FEATURE ID: 10] account, identifieraddress, identification, attribute, access, image, information, authorization[FEATURE ID: 10] efficient performance
[FEATURE ID: 11] information objects, portions, personal information objects, requestsinformation, items, messages, types, records, objects, files[FEATURE ID: 11] multiple sets
[FEATURE ID: 12] responseaccordance, order, conformity, addition, parallel, according, reply[FEATURE ID: 12] response
[FEATURE ID: 13] first portion, numbergroup, list, plurality, subset, quantity, range, amount[FEATURE ID: 13] set
[FEATURE ID: 14] claimparagraph, requirement, previous claim, step, clam, invention, clause[FEATURE ID: 14] claim
[FEATURE ID: 15] criteriaparameters, conditions, data, rules, algorithms[FEATURE ID: 15] system routines
1 . A method for automatically disbursing [TRANSITIVE ID: 1]

a first party ' s personal information [FEATURE ID: 2]

to a second party [FEATURE ID: 3]

authorized by the first party by transmitting [TRANSITIVE ID: 4]

said first party ' s personal information from a server computer [FEATURE ID: 5]

operated by a service provider , said server computer coupled [TRANSITIVE ID: 6]

to a database [FEATURE ID: 7]

, the method comprising [TRANSITIVE ID: 8]

the steps [FEATURE ID: 9]

of : establishing [TRANSITIVE ID: 4]

an account [FEATURE ID: 10]

for the first party with the server computer : assigning [TRANSITIVE ID: 1]

an identifier [FEATURE ID: 10]

to the first party ; entering [TRANSITIVE ID: 1]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 11]

; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions [FEATURE ID: 11]

of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response [FEATURE ID: 12]

to the request , selecting a first portion [FEATURE ID: 13]

of the first party ' s personal information objects [FEATURE ID: 11]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information , recording the second party identifier ; and rejecting the second party ' s request for information . 2 . The method of claim [FEATURE ID: 14]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number [FEATURE ID: 13]

of requests [FEATURE ID: 11]

that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 2]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 15]

1 . A computer system , comprising [TRANSITIVE ID: 8]

: a bus [FEATURE ID: 5]

for communicating [TRANSITIVE ID: 1]

information ; a power supply [FEATURE ID: 3]

supplying [TRANSITIVE ID: 4]

first and second supply voltages ; a switch circuit [FEATURE ID: 3]

for selecting [TRANSITIVE ID: 4]

the additional functions ; a read only memory unit coupled [TRANSITIVE ID: 6]

with the bus , for storing [TRANSITIVE ID: 4]

a set [FEATURE ID: 13]

of basic input / output system routines which control input and output peripherals [FEATURE ID: 2]

of the computer system ; an auxiliary memory unit coupled with the bus , for storing a set of operating system routines [FEATURE ID: 15]

which control operation [FEATURE ID: 9]

of the computer system for the purpose of obtaining [TRANSITIVE ID: 8]

an efficient performance [FEATURE ID: 10]

of the system ; an additional function memory unit coupled with the bus , for storing multiple sets [FEATURE ID: 11]

of application routines [FEATURE ID: 9]

which execute the additional functions respectively ; a central processing unit coupled with the bus , for processing information according to instructions [FEATURE ID: 9]

of the routines ; a random access memory unit coupled with the bus , for storing the instructions , the information , temporary variables and immediate information during execution of the instructions by said central processing unit temporarily ; and a booting control circuit operated with said first supply voltage , for generating a power control signal and an interrupt request signal when at least one of the additional functions is selected , said power supply to apply said second supply voltage to the central processing unit , the memory [FEATURE ID: 7]

, and the input / output peripherals in response [FEATURE ID: 12]

to said power control signal , and said central processing unit loads the basic input / output system routines and the application routines into said random access memory unit in order , in response to said interrupt request signal . 2 . The computer system of the claim [FEATURE ID: 14]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US6003065A
Filed: 1997-04-24
Issued: 1999-12-14
Patent Holder: (Original Assignee) Sun Microsystems Inc     (Current Assignee) Oracle America Inc
Inventor(s): Albert Yan, Jici Gao, Gerald Pelissier

Title: Method and system for distributed processing of applications on host and peripheral devices

[FEATURE ID: 1] methodapparatus, mechanism, means, system[FEATURE ID: 1] first network interface capable
[FEATURE ID: 2] second party, service provider, second party 'second, first, server, controller, receiver, computer, host[FEATURE ID: 2] host computer, first network interface, second network interface, second virtual machine instruction processor, virtual machine instruction processor
[TRANSITIVE ID: 3] transmitting, enteringreceiving, storing, collecting, providing, obtaining, recording, reading[TRANSITIVE ID: 3] containing
[FEATURE ID: 4] server computercomputer, host, system, server, processor, machine, peripheral[FEATURE ID: 4] data processing system, network, peripheral device database, capabilities, first virtual machine instruction processor capable, storage device, first virtual machine instruction processor, peripheral device
[TRANSITIVE ID: 5] operatedinstalled, provided, implemented, located, disposed, encoded, maintained[TRANSITIVE ID: 5] stored, embedded
[TRANSITIVE ID: 6] coupledlinkable, associated, joined, adapted, linking, coupling, communicating[TRANSITIVE ID: 6] coupled
[FEATURE ID: 7] databasescanner, storage, keyboard, databases, router, transceiver, network[FEATURE ID: 7] download mechanism, image capture devices, sound generation devices
[TRANSITIVE ID: 8] comprising, assigningproviding, containing, including, encompassing, has, includes, involving[TRANSITIVE ID: 8] having, comprising, concerning
[FEATURE ID: 9] stepsmethods, procedures, tasks, actions, functions[FEATURE ID: 9] virtual machine instructions
[TRANSITIVE ID: 10] establishinggenerating, determining, issuing, managing, accepting, identifying, initiating[TRANSITIVE ID: 10] executing
[FEATURE ID: 11] information objects, security levels, portions, criteriaattributes, categories, elements, fields, parameters, types, rules[FEATURE ID: 11] information
[FEATURE ID: 12] partiesterminals, clients, users, units, systems[FEATURE ID: 12] peripheral devices
[FEATURE ID: 13] leastminimum, minus, lease, lest, feast, most, last[FEATURE ID: 13] least
[FEATURE ID: 14] first portion, numberplurality, fraction, part, list, range, set, quantity[FEATURE ID: 14] profile, portion
[FEATURE ID: 15] personal information objects, informationcontent, personal information, documents, identifier, requests, files, transmissions[FEATURE ID: 15] data
[FEATURE ID: 16] claimclause, figure, paragraph, item, to claim[FEATURE ID: 16] claim
[FEATURE ID: 17] criterionparameter, condition, requirement, rule, function[FEATURE ID: 17] criteria
1 . A method [FEATURE ID: 1]

for automatically disbursing a first party ' s personal information to a second party [FEATURE ID: 2]

authorized by the first party by transmitting [TRANSITIVE ID: 3]

said first party ' s personal information from a server computer [FEATURE ID: 4]

operated [TRANSITIVE ID: 5]

by a service provider [FEATURE ID: 2]

, said server computer coupled [TRANSITIVE ID: 6]

to a database [FEATURE ID: 7]

, the method comprising [TRANSITIVE ID: 8]

the steps [FEATURE ID: 9]

of : establishing [TRANSITIVE ID: 10]

an account for the first party with the server computer : assigning [TRANSITIVE ID: 8]

an identifier to the first party ; entering [TRANSITIVE ID: 3]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 11]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 11]

to each information object at any granularity , thereby enabling access to individually selected portions [FEATURE ID: 11]

of the first party ' s personal information by individual receiving parties [FEATURE ID: 12]

; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least [FEATURE ID: 13]

the first party identifier ; in response to the request , selecting a first portion [FEATURE ID: 14]

of the first party ' s personal information objects [FEATURE ID: 15]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information [FEATURE ID: 15]

, recording the second party identifier ; and rejecting the second party ' [FEATURE ID: 2]

s request for information . 2 . The method of claim [FEATURE ID: 16]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number [FEATURE ID: 14]

of requests that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key ; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 11]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 17]

1 . A distributed data processing system [FEATURE ID: 4]

having [TRANSITIVE ID: 8]

a host computer [FEATURE ID: 2]

coupled [TRANSITIVE ID: 6]

by way of a network [FEATURE ID: 4]

to one or more peripheral devices [FEATURE ID: 12]

, the system comprising [TRANSITIVE ID: 8]

: a peripheral device database [FEATURE ID: 4]

coupled to the network , and containing [TRANSITIVE ID: 3]

information [FEATURE ID: 11]

concerning [TRANSITIVE ID: 8]

a profile [FEATURE ID: 14]

of the capabilities [FEATURE ID: 4]

for each of the one or more peripheral devices coupled to the network ; a host computer comprising : a first network interface [FEATURE ID: 2]

coupled to the network and suitable for bi-directional transmission of data [FEATURE ID: 15]

between the host computer and the network ; a first virtual machine instruction processor capable [FEATURE ID: 4]

of executing [TRANSITIVE ID: 10]

one or more virtual machine instructions [FEATURE ID: 9]

; a storage device [FEATURE ID: 4]

coupled to the first virtual machine instruction processor [FEATURE ID: 4]

; an application having one or more virtual machine instructions stored [TRANSITIVE ID: 5]

in the storage device ; a determination mechanism embedded [TRANSITIVE ID: 5]

in the application stored on the storage device which queries the peripheral device database based upon a predetermined criteria [FEATURE ID: 17]

and selects which peripheral device [FEATURE ID: 4]

should execute at least a portion [FEATURE ID: 14]

of the application wherein said at least a portion of the application includes at least [FEATURE ID: 13]

one virtual machine instruction ; and a download mechanism [FEATURE ID: 7]

coupled to the first network interface capable [FEATURE ID: 1]

of transferring an application to one of the peripheral devices for execution ; and a peripheral device comprising : a second network interface [FEATURE ID: 2]

coupled to the network and suitable for bi-directional transmission of data between the peripheral device and the network ; and a second virtual machine instruction processor [FEATURE ID: 2]

coupled to the second network interface and capable of executing one or more virtual machine instructions wherein following receipt from said host computer of said least a portion of said application including at least one virtual machine instruction for said peripheral device , said virtual machine instruction processor [FEATURE ID: 2]

executes said at least a portion of the application including said one virtual machine instruction . 2 . The distributed data processing system of claim [FEATURE ID: 16]

1 wherein the one or more peripheral devices included in the peripheral device database includes printer devices . 3 . The distributed data processing system of claim 1 wherein the one or more peripheral devices included in the peripheral device database includes image capture devices [FEATURE ID: 7]

. 4 . The distributed data processing system of claim 1 wherein the one or more peripheral devices included in the peripheral device database includes telecommunication devices . 5 . The distributed data processing system of claim 1 wherein the one or more peripheral devices included in the peripheral device database includes display devices . 6 . The distributed data processing system of claim 1 wherein the one or more peripheral devices included in the peripheral device database includes sound generation devices [FEATURE ID: 7]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US6000033A
Filed: 1997-11-26
Issued: 1999-12-07
Patent Holder: (Original Assignee) International Business Machines Corp     (Current Assignee) International Business Machines Corp
Inventor(s): Edward E. Kelley, Norman J. Dauerer, John U. Knickerbocker

Title: Password control via the web

[FEATURE ID: 1] methodcomputerized, protocol, mechanism, means, methodology, technique, procedure[FEATURE ID: 1] process
[TRANSITIVE ID: 2] disbursing, establishing, assigningtransmitting, distributing, issuing, communicating, sending, transferring, delivering[TRANSITIVE ID: 2] providing
[FEATURE ID: 3] personal information, identifier, second party identifier, number, authorization keyinformation, authorization, access, indication, authentication, communications, individual[FEATURE ID: 3] passwords, applications, group
[FEATURE ID: 4] second party, first party, service provider, database, second party 'customer, user, subscriber, person, receiver, client, system[FEATURE ID: 4] client computer
[TRANSITIVE ID: 5] transmittingobtaining, requesting, selecting, providing, acquiring, entering, using[TRANSITIVE ID: 5] assigning, accessing
[FEATURE ID: 6] server computerserver, workstation, client, network, database, computer, memory[FEATURE ID: 6] program storage device accessible, program storage device
[TRANSITIVE ID: 7] operatedsupported, located, accessible, used, available, hosted, distributed[TRANSITIVE ID: 7] accessed, services accessible
[TRANSITIVE ID: 8] coupled, individualreferring, relating, related, belonging, associated, responsive, specific[TRANSITIVE ID: 8] corresponding
[TRANSITIVE ID: 9] comprising, enteringincluding, providing, containing, incorporating, and, with, defining[TRANSITIVE ID: 9] comprising, having
[FEATURE ID: 10] stepsmethods, activities, additional steps, successive steps, individual steps, method steps, operative steps[FEATURE ID: 10] steps
[FEATURE ID: 11] information objects, personal information objects, requestsdocuments, files, information, users, messages, pages, networks[FEATURE ID: 11] different servers, databases, other services
[FEATURE ID: 12] security levels, criteriakeys, values, attributes, data, codes, parameters, credentials[FEATURE ID: 12] real passwords, variable names
[FEATURE ID: 13] accessbrowsing, retrieval, entry, viewing, availability[FEATURE ID: 13] access
[FEATURE ID: 14] partiesparticipants, persons, customers, members, subscribers, individuals, clients[FEATURE ID: 14] users
[FEATURE ID: 15] first party identifiertoken, number, user, name, data[FEATURE ID: 15] real password
[FEATURE ID: 16] security levelkey, value, code, secret[FEATURE ID: 16] user identification
[FEATURE ID: 17] first portionfirst, one, number, subset, plurality, predetermined group, particular group[FEATURE ID: 17] first group, second group
[FEATURE ID: 18] claimpreceding claim, requirement, figure, step, invention, clause, embodiment[FEATURE ID: 18] claim
[FEATURE ID: 19] criterioncode, function, field, variable, term, number, parameter[FEATURE ID: 19] variable name
1 . A method [FEATURE ID: 1]

for automatically disbursing [TRANSITIVE ID: 2]

a first party ' s personal information [FEATURE ID: 3]

to a second party [FEATURE ID: 4]

authorized by the first party [FEATURE ID: 4]

by transmitting [TRANSITIVE ID: 5]

said first party ' s personal information from a server computer [FEATURE ID: 6]

operated [TRANSITIVE ID: 7]

by a service provider [FEATURE ID: 4]

, said server computer coupled [TRANSITIVE ID: 8]

to a database [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 9]

the steps [FEATURE ID: 10]

of : establishing [TRANSITIVE ID: 2]

an account for the first party with the server computer : assigning [TRANSITIVE ID: 2]

an identifier [FEATURE ID: 3]

to the first party ; entering [TRANSITIVE ID: 9]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 11]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 12]

to each information object at any granularity , thereby enabling access [FEATURE ID: 13]

to individually selected portions of the first party ' s personal information by individual [FEATURE ID: 8]

receiving parties [FEATURE ID: 14]

; storing in the database the first party identifier [FEATURE ID: 15]

, the information object and the security level [FEATURE ID: 16]

assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion [FEATURE ID: 17]

of the first party ' s personal information objects [FEATURE ID: 11]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier [FEATURE ID: 3]

; if the second party is not authorized to receive the information , recording the second party identifier ; and rejecting the second party ' [FEATURE ID: 4]

s request for information . 2 . The method of claim [FEATURE ID: 18]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number [FEATURE ID: 3]

of requests [FEATURE ID: 11]

that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 3]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 12]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 19]

1 . A process [FEATURE ID: 1]

for providing [TRANSITIVE ID: 2]

passwords [FEATURE ID: 3]

from a client computer [FEATURE ID: 4]

to different servers [FEATURE ID: 11]

, databases [FEATURE ID: 11]

and applications [FEATURE ID: 3]

and other services [FEATURE ID: 11]

accessed [TRANSITIVE ID: 7]

on and inter - or intra-net comprising [TRANSITIVE ID: 9]

the steps [FEATURE ID: 10]

of : a ) providing a reference table having [TRANSITIVE ID: 9]

a listing of a plurality of services accessible [FEATURE ID: 7]

on an inter - or intra-net and a real password [FEATURE ID: 15]

associated with each of said services ; b ) assigning [TRANSITIVE ID: 5]

a first virtual password corresponding [TRANSITIVE ID: 8]

to a first group [FEATURE ID: 17]

of said services and associated real passwords [FEATURE ID: 12]

; c ) providing said first virtual password to a first group of users [FEATURE ID: 14]

of said client computer ; d ) assigning a second virtual password corresponding to a second group [FEATURE ID: 17]

of said services and associated real passwords , said second group of said services being different from said first group of said services and said second virtual password being different from said first virtual password ; e ) providing said second virtual password to a second group of users of said client computer , said second group of users being different from said first group of users ; and f ) accessing [TRANSITIVE ID: 5]

a desired one of said services on an inter - or intra-net from said client computer by using one of said first or second virtual passwords assigned to the group [FEATURE ID: 3]

of said desired service , whereby upon use of the assigned virtual password , said reference table is used by said client computer to substitute the real password associated with said desired service for the assigned virtual password . 2 . The process of claim [FEATURE ID: 18]

1 wherein said step ( f ) of accessing said desired service is performed after said steps ( b ) and ( d ) of assigning said respective first and second virtual passwords . 3 . The process of claim 1 wherein said step ( a ) comprises providing on a program storage device accessible [FEATURE ID: 6]

by a client computer a reference table having a listing of a plurality of services accessible on an inter - or intra-net and a real password associated with each of said services , said reference table being accessible by said client computer to change the real passwords associated with each of said services . 4 . The process of claim 1 wherein said step ( f ) of accessing a desired one said services on an inter - or intra-net from said client computer is by one of said first group of users using said first virtual password assigned to the group of said desired service , whereby upon use of the assigned first virtual password , said reference table is used by said client computer to substitute the real password associated with said desired service for the assigned first virtual password , and further including the step of accessing a desired another one said services on an inter - or intra-net from said client computer by one of said second group of users using said second virtual password assigned to the group of said another desired service , whereby upon use of the assigned second virtual password , said reference table is used by said client computer to substitute the real password associated with said desired service for the assigned second virtual password . 5 . The process of claim 1 wherein said real password provided in step ( a ) includes a user identification [FEATURE ID: 16]

. 6 . The process of claim 1 wherein in step ( a ) said reference table is provided on a program storage device [FEATURE ID: 6]

. 7 . A process for providing passwords from a client computer to different servers , databases and applications and other services accessed on and inter - or intra-net comprising the steps of : a ) providing on a program storage device a reference table having a listing of a plurality of services accessible on an inter - or intra-net , a real password associated with each of said services , a variable name [FEATURE ID: 19]

for said real password used by each of said services to enter the real password associated therewith , and a virtual password corresponding to a desired group of said services and associated real passwords ; b ) selecting a desired service listed on said desired group of services in said reference table for access [FEATURE ID: 13]

on said inter - or intra-net ; c ) entering said virtual password corresponding to desired said group of services to begin access to said desired service on said inter - or intra-net ; d ) finding the variable name for the real password associated with said desired service on said reference table ; and e ) using said variable name for the real password to enter the real password for said desired service to gain access to said desired service . 8 . The process of claim 7 further including in step ( a ) providing on said reference table for said services accessible on an inter - or intra-net user identifications for said services and variable names [FEATURE ID: 12]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5991842A
Filed: 1996-08-27
Issued: 1999-11-23
Patent Holder: (Original Assignee) Canon Inc     (Current Assignee) Canon Inc
Inventor(s): Nobutoshi Takayama

Title: Communication system for providing digital data transfer, electronic equipment for transferring data using the communication system, and an interface control device

[FEATURE ID: 1] personal information, request, informationcall, transaction, response, signal, notification, first, communication[FEATURE ID: 1] fundamental communication protocol specific
[TRANSITIVE ID: 2] transmittingprocessing, providing, supplying, sending, reading, storing, communicating[TRANSITIVE ID: 2] selecting, control
[FEATURE ID: 3] server computer, service provider, databasenetwork, server, terminal, host, system, computer, processor[FEATURE ID: 3] serial bus interface, device
[TRANSITIVE ID: 4] operatedassigned, used, operable, provided, accessible[TRANSITIVE ID: 4] connected
[TRANSITIVE ID: 5] coupledcommunicating, having, connecting, linking, coupling[TRANSITIVE ID: 5] interconnecting
[TRANSITIVE ID: 6] comprisingincluding, has, comprises, includes, having, containing, providing[TRANSITIVE ID: 6] comprising
[TRANSITIVE ID: 7] establishing, enteringregistering, receiving, providing, maintaining, setting, displaying, managing[TRANSITIVE ID: 7] storing
[FEATURE ID: 8] accountinterface, arrangement, interconnection, exchange, attachment[FEATURE ID: 8] electronic equipment
[FEATURE ID: 9] information objects, portionsitems, elements, categories, amounts, pages, files, fields[FEATURE ID: 9] pieces
[FEATURE ID: 10] security levelsparameters, characteristics, codes, types, controls[FEATURE ID: 10] functions
[FEATURE ID: 11] information objectinformation, member, element, portion, item[FEATURE ID: 11] piece
[FEATURE ID: 12] partiesterminals, stations, units, computers, systems[FEATURE ID: 12] electronic equipments
[FEATURE ID: 13] responseconnection, correspondence, conformity, parallel, regard, accordance, correlation[FEATURE ID: 13] response, addition
[FEATURE ID: 14] claimpreceding claim, requirement, figure, clam, clause, paragraph, item[FEATURE ID: 14] claim
1 . A method for automatically disbursing a first party ' s personal information [FEATURE ID: 1]

to a second party authorized by the first party by transmitting [TRANSITIVE ID: 2]

said first party ' s personal information from a server computer [FEATURE ID: 3]

operated [TRANSITIVE ID: 4]

by a service provider [FEATURE ID: 3]

, said server computer coupled [TRANSITIVE ID: 5]

to a database [FEATURE ID: 3]

, the method comprising [TRANSITIVE ID: 6]

the steps of : establishing [TRANSITIVE ID: 7]

an account [FEATURE ID: 8]

for the first party with the server computer : assigning an identifier to the first party ; entering [TRANSITIVE ID: 7]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 9]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 10]

to each information object [FEATURE ID: 11]

at any granularity , thereby enabling access to individually selected portions [FEATURE ID: 9]

of the first party ' s personal information by individual receiving parties [FEATURE ID: 12]

; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request [FEATURE ID: 1]

, said request comprising at least the first party identifier ; in response [FEATURE ID: 13]

to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information [FEATURE ID: 1]

, recording the second party identifier ; and rejecting the second party ' s request for information . 2 . The method of claim [FEATURE ID: 14]

1 . An electronic equipment [FEATURE ID: 8]

connected [TRANSITIVE ID: 4]

to a serial bus interface [FEATURE ID: 3]

interconnecting [TRANSITIVE ID: 5]

a plurality of electronic equipments [FEATURE ID: 12]

, comprising [TRANSITIVE ID: 6]

: a plurality of different functions ; storage means for storing [TRANSITIVE ID: 7]

a plurality of pieces [FEATURE ID: 9]

of information representative of the plurality of functions [FEATURE ID: 10]

; switching means for selectively executing the plurality of functions ; selecting [TRANSITIVE ID: 2]

means for selecting one piece [FEATURE ID: 11]

of the plurality of pieces of function information stored in said storage means ; and interface control means capable of outputting to the serial bus interface one piece of the plurality of pieces of function information selected by said selecting means , wherein said selecting means selects one piece of function information in response [FEATURE ID: 13]

to a resetting of a management condition of a serial bus used with the serial bus interface . 2 . An electronic equipment according to claim [FEATURE ID: 14]

1 , wherein the plurality of pieces of function information are assigned different addresses , and said selecting means selects one of the different addresses . 3 . An electronic equipment according to claim 1 , wherein said storage means further stores a plurality of pieces of protocol information representative of a plurality of subsidiary communication protocols corresponding to the plurality of different functions , and said interface control means can selectively execute the plurality of subsidiary communication protocols in addition [FEATURE ID: 13]

to a fundamental communication protocol specific [FEATURE ID: 1]

to the serial bus interface . 4 . An electronic equipment according to claim 3 , wherein said selecting means further selects one piece of the plurality of pieces of protocol information , and said interface control means can output the protocol information selected by said selecting means to the serial bus interface . 5 . An electronic equipment according to claim 1 , wherein the serial bus used with the serial bus interface is in conformity with IEEE 1394 standards . 6 . An electronic equipment connected to a serial bus interface interconnecting a plurality of electronic equipments , comprising : interface controlling means capable of executing a plurality of subsidiary communication protocols in addition to a fundamental communication protocol ; storage means for storing a plurality of pieces of protocol information representative of the plurality of subs - diary communication protocols ; switching means for selectively executing the plurality of subsidiary communication protocols ; and selecting means for selecting one piece of the plurality of pieces of protocol information stored in said storage means , wherein said selecting means selects one piece of protocol information in response to a resetting of a management condition of a serial bus used with the serial bus interface , and said interface controlling means can output to the serial bus interface one piece of the plurality of pieces of protocol information selected by said selecting means . 7 . An electronic equipment according to claim 6 , wherein the plurality of pieces of protocol information are assigned different addresses , and said selecting means selects on e of the different addresses . 8 . An electronic equipment according to claim 7 , wherein the serial bus used with the serial bus interface is in conformity with IEEE 1394 standards . 9 . A device [FEATURE ID: 3]

for controlling a serial bus interface interconnecting a plurality of nodes , comprising : storage means for storing a plurality of pieces of information representative of a plurality of functions provided by one of the plurality of nodes ; selecting means for selecting one piece of the plurality of pieces of function information stored in said storage means ; and control [FEATURE ID: 2]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5978603A
Filed: 1997-09-09
Issued: 1999-11-02
Patent Holder: (Original Assignee) Olympus Optic Co Ltd     (Current Assignee) Olympus Corp
Inventor(s): Toshikatsu Shiozaki, Takashi Inoue

Title: Camera

[FEATURE ID: 1] second partymember, terminal, portion, device[FEATURE ID: 1] switch
[TRANSITIVE ID: 2] authorizeddetermined, required, designated, specified, desired[TRANSITIVE ID: 2] predetermined
[TRANSITIVE ID: 3] operatedheld, supported, configured, arranged, installed, disposed, constructed[TRANSITIVE ID: 3] attached, opened, provided, constituted, end set
[TRANSITIVE ID: 4] comprisingincluding, containing, has, incorporating, providing, involving, comprises[TRANSITIVE ID: 4] comprising
[FEATURE ID: 5] portionsareas, regions, locations, points, pieces, ones, levels[FEATURE ID: 5] portions, directions
[FEATURE ID: 6] responseproximity, conformity, accordance, parallel, conformance, correspondence, connection[FEATURE ID: 6] contact
[FEATURE ID: 7] first portion, numberrange, quantity, section, plurality, set, group, portion[FEATURE ID: 7] angle, state, pair
[FEATURE ID: 8] claimparagraph, statement, requirement, figure, previous claim, aspect, invention[FEATURE ID: 8] claim
1 . A method for automatically disbursing a first party ' s personal information to a second party [FEATURE ID: 1]

authorized [TRANSITIVE ID: 2]

by the first party by transmitting said first party ' s personal information from a server computer operated [TRANSITIVE ID: 3]

by a service provider , said server computer coupled to a database , the method comprising [TRANSITIVE ID: 4]

the steps of : establishing an account for the first party with the server computer : assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions [FEATURE ID: 5]

of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response [FEATURE ID: 6]

to the request , selecting a first portion [FEATURE ID: 7]

of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information , recording the second party identifier ; and rejecting the second party ' s request for information . 2 . The method of claim [FEATURE ID: 8]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number [FEATURE ID: 7]

1 . A camera comprising [TRANSITIVE ID: 4]

: a camera body ; a cover unit attached [TRANSITIVE ID: 3]

to the camera body so as to be rotatably opened [TRANSITIVE ID: 3]

and closed about a spindle ; and a stop member provided [TRANSITIVE ID: 3]

to prevent the cover unit from rotating over a predetermined [TRANSITIVE ID: 2]

angle [FEATURE ID: 7]

, wherein : the cover unit is constituted [TRANSITIVE ID: 3]

by an inner cover and an outer cover integrally attached as a unit in a state [FEATURE ID: 7]

where electric circuit components are interposed therebetween , and comprises a pair [FEATURE ID: 7]

of contact portions , each having a semicircular surface brought into contact [FEATURE ID: 6]

with a circumferential surface of a shaft portion attached to the camera body , respectively formed in corresponding portions [FEATURE ID: 5]

of contact surfaces of the inner and outer covers , the pair of contact portions rotatably supporting a circumferential surface of the shaft portion in two directions [FEATURE ID: 5]

, thereby constituting a bearing portion ; and the stop member has an end rotatably supported by the camera body and another end set [FEATURE ID: 3]

to be slidable along a guide groove formed between the inner cover and the outer cover . 2 . The camera according to claim [FEATURE ID: 8]

1 , wherein the spindle is constituted by combining a bearing portion provided in the camera body and a shaft portion provided in the cover unit . 3 . The camera according to claim 1 , wherein the electric circuit components are stroboscopic components and the cover unit is a pop - up type stroboscope . 4 . The camera according to claim 2 , wherein the electric circuit components are stroboscopic components and the cover unit is a pop - up type stroboscope . 5 . The camera according to claim 1 , wherein lead lines of the electric circuit components are connected to an electric circuit within the camera body through a path coaxial with the spindle . 6 . The camera according to claim 3 , wherein lead lines of the electric circuit components are connected to an electric circuit within the camera body through a path coaxial with the spindle . 7 . The camera according to claim 4 , wherein lead lines of the electric circuit components are connected to an electric circuit within the camera body through a path coaxial with the spindle . 8 . The camera according to claim 5 , wherein a detecting switch [FEATURE ID: 1]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5974389A
Filed: 1996-03-01
Issued: 1999-10-26
Patent Holder: (Original Assignee) Glaxo Wellcome Inc; Intelligent Medical Systems Inc     (Current Assignee) Sherwood Medical Co ; SmithKline Beecham Corp
Inventor(s): Melanie Ann Clark, John Finley Gold, Michael Edward Huska, Geoffrey Harold Kabel, Marc Merrill Graham

Title: Medical record management system and process with improved workflow features

[FEATURE ID: 1] methodapparatus, service, mechanism, technique, system, process[FEATURE ID: 1] patient record system
[TRANSITIVE ID: 2] disbursing, establishing, assigning, enteringproviding, transmitting, obtaining, displaying, identifying, administering, communicating[TRANSITIVE ID: 2] recording, maintaining
[FEATURE ID: 3] personal information, security levels, security level, criteriainformation, rights, attributes, parameters, data, restrictions, settings[FEATURE ID: 3] access rules
[FEATURE ID: 4] second party, database, second party ', junk requestersystem, client, customer, user, terminal, computer, subscriber[FEATURE ID: 4] patient, caregiver, patient chart workflow subsystem
[TRANSITIVE ID: 5] authorizedregistered, designated, authenticated, requested, approved[TRANSITIVE ID: 5] authorization
[FEATURE ID: 6] first party, service providerperson, first, user, customer, provider, second, helper[FEATURE ID: 6] first caregiver, second caregiver, first patient
[TRANSITIVE ID: 7] transmittingcollecting, storing, receiving, providing[TRANSITIVE ID: 7] having
[FEATURE ID: 8] server computerserver, computer, database, network, patient, processor[FEATURE ID: 8] patient record database, system
[TRANSITIVE ID: 9] coupledresponsive, associated, linkable, linked, relating, referring, attached[TRANSITIVE ID: 9] coupled, corresponding
[TRANSITIVE ID: 10] comprisingincluding, comprises, having, containing, incorporating, has, being[TRANSITIVE ID: 10] comprising, providing
[FEATURE ID: 11] account, access, authorization keyauthorization, authentication, entry, association, engagement, input, identification[FEATURE ID: 11] access
[FEATURE ID: 12] identifier, requestsinformation, access, contacts, addresses, entry, indicia, records[FEATURE ID: 12] patient data
[FEATURE ID: 13] information objects, timessessions, people, events, files, days, locations, appointments[FEATURE ID: 13] encounters, patients
[FEATURE ID: 14] information object, informationportion, data, first, field, communication, item, identifier[FEATURE ID: 14] first contact portion
[FEATURE ID: 15] partiesclients, stations, means, computers, units[FEATURE ID: 15] terminals
[FEATURE ID: 16] first party identifierdatabase, date, patient, information, medical data, access, patient data[FEATURE ID: 16] patient data responsive, data
[FEATURE ID: 17] first portion, numberplurality, subset, list, group, potion, first, range[FEATURE ID: 17] second contact portion, set, portion, round
[FEATURE ID: 18] claimpreceding claim, embodiment, statement, item, paragraph, clause, clam[FEATURE ID: 18] claim
[FEATURE ID: 19] criterioncode, factor, condition, restriction, flag, function, parameter[FEATURE ID: 19] rule
1 . A method [FEATURE ID: 1]

for automatically disbursing [TRANSITIVE ID: 2]

a first party ' s personal information [FEATURE ID: 3]

to a second party [FEATURE ID: 4]

authorized [TRANSITIVE ID: 5]

by the first party [FEATURE ID: 6]

by transmitting [TRANSITIVE ID: 7]

said first party ' s personal information from a server computer [FEATURE ID: 8]

operated by a service provider [FEATURE ID: 6]

, said server computer coupled [TRANSITIVE ID: 9]

to a database [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 10]

the steps of : establishing [TRANSITIVE ID: 2]

an account [FEATURE ID: 11]

for the first party with the server computer : assigning [TRANSITIVE ID: 2]

an identifier [FEATURE ID: 12]

to the first party ; entering [TRANSITIVE ID: 2]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 13]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 3]

to each information object [FEATURE ID: 14]

at any granularity , thereby enabling access [FEATURE ID: 11]

to individually selected portions of the first party ' s personal information by individual receiving parties [FEATURE ID: 15]

; storing in the database the first party identifier [FEATURE ID: 16]

, the information object and the security level [FEATURE ID: 3]

assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion [FEATURE ID: 17]

of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information [FEATURE ID: 14]

, recording the second party identifier ; and rejecting the second party ' [FEATURE ID: 4]

s request for information . 2 . The method of claim [FEATURE ID: 18]

1 , further comprising the steps of : designating the second party as a junk requester [FEATURE ID: 4]

if the second party presents a predetermined number [FEATURE ID: 17]

of requests [FEATURE ID: 12]

that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 11]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 3]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 19]

to indicate the number of times [FEATURE ID: 13]

1 . A patient record system [FEATURE ID: 1]

for recording [FEATURE ID: 2]

and maintaining [TRANSITIVE ID: 2]

medical information for a patient [FEATURE ID: 4]

, comprising [TRANSITIVE ID: 10]

: a first caregiver ' s terminal to allow a first caregiver [FEATURE ID: 6]

to access the patient record system ; a second caregiver ' s terminal to allow a second caregiver [FEATURE ID: 6]

to access the patient record system ; a patient record database [FEATURE ID: 8]

having [TRANSITIVE ID: 7]

patient data [FEATURE ID: 12]

, the patient record database being coupled [TRANSITIVE ID: 9]

to said first and second caregivers ' terminals , the patient record database providing [TRANSITIVE ID: 10]

a first contact portion [FEATURE ID: 14]

corresponding [TRANSITIVE ID: 9]

to access [FEATURE ID: 11]

by the first caregiver to the patient record system and a second contact portion [FEATURE ID: 17]

corresponding to access by the second caregiver to the patient record system , the patient record database selectively providing access to the patient data from one of the first and second caregiver ' s terminals responsive to a predetermined set [FEATURE ID: 17]

of access rules [FEATURE ID: 3]

. 2 . A patient record system as in claim [FEATURE ID: 18]

1 , wherein the predetermined set of access rules includes a rule [FEATURE ID: 19]

selectively permitting access to a portion [FEATURE ID: 17]

of the patient data responsive [FEATURE ID: 16]

to the first caregiver having authorization [FEATURE ID: 5]

for access to said portion of the patient data and responsive to the portion of data [FEATURE ID: 16]

not being accessed by another caregiver [FEATURE ID: 4]

. 3 . A system [FEATURE ID: 8]

as in claim 1 , further comprising a patient chart workflow subsystem [FEATURE ID: 4]

operatively coupled to said patient record database and said first and second caregiver ' s terminals [FEATURE ID: 15]

, the patient chart workflow subsystem configured to allow the first caregiver to engage in a first patient encounter corresponding to a first patient [FEATURE ID: 6]

while engaging in a second patient encounter corresponding to a second patient . 4 . A system as in claim 3 , wherein the patient chart workflow subsystem is further configured to allow said first caregiver to open a plurality of encounters [FEATURE ID: 13]

for a plurality of patients [FEATURE ID: 13]

, upon commencing a round [FEATURE ID: 17]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5974148A
Filed: 1992-11-17
Issued: 1999-10-26
Patent Holder: (Original Assignee) Stambler; Leon     
Inventor(s): Leon Stambler

Title: Method for securing information relevant to a transaction

[FEATURE ID: 1] methoddigital method, procedure, way, computer method, business method, security method, communication method[FEATURE ID: 1] method
[TRANSITIVE ID: 2] disbursing, transmitting, assigningproviding, distributing, communicating, sending, delivering, issuing, conveying[TRANSITIVE ID: 2] transferring, attaching
[FEATURE ID: 3] first party ', first party, service provideruser, first, party, person, customer, bank, merchant[FEATURE ID: 3] first party, second party, first party ', second party '
[FEATURE ID: 4] personal informationuser, person, account, identity, individual[FEATURE ID: 4] entity
[FEATURE ID: 5] second partyuser, location, payee, computer, number, party, device[FEATURE ID: 5] secret key, third party
[FEATURE ID: 6] server computer, databaseserver, terminal, network, client, website, workstation, host[FEATURE ID: 6] computer
[TRANSITIVE ID: 7] coupledbelonging, linking, relating, referring, responsive, leading[TRANSITIVE ID: 7] attesting
[TRANSITIVE ID: 8] comprisingcontaining, having, providing, by, comprises, includes, involving[TRANSITIVE ID: 8] comprising, using, including
[TRANSITIVE ID: 9] establishing, enteringgenerating, receiving, defining, obtaining, selecting, developing, preparing[TRANSITIVE ID: 9] creating
[FEATURE ID: 10] account, alarm indication, authorization keyidentifier, authorization, identification, authentication, address, identity, algorithm[FEATURE ID: 10] amount, error detection code
[FEATURE ID: 11] identifieralias, address, information, identification, amount[FEATURE ID: 11] name
[FEATURE ID: 12] security levels, criteriacharacteristics, attributes, credentials, parameters, terms, categories, rules[FEATURE ID: 12] information
[FEATURE ID: 13] first party identifieridentifier, name, signature, date, country, identification, number[FEATURE ID: 13] authenticity, second VAN, account number, bank name, routing transit number
[FEATURE ID: 14] security levelkey, value, password, code, secret[FEATURE ID: 14] non-secret key
[FEATURE ID: 15] personal information objectscontent, accounts, items, information, data[FEATURE ID: 15] funds
[FEATURE ID: 16] second party identifierpassword, record, key, fingerprint, signature, license[FEATURE ID: 16] PIN
[FEATURE ID: 17] second party 'third, user, first, party, first party[FEATURE ID: 17] second
[FEATURE ID: 18] claimpreceding claim, figure, step, clause, embodiment, paragraph, item[FEATURE ID: 18] claim
[FEATURE ID: 19] criterionflag, code, quantity, value, number[FEATURE ID: 19] date
1 . A method [FEATURE ID: 1]

for automatically disbursing [TRANSITIVE ID: 2]

a first party ' [FEATURE ID: 3]

s personal information [FEATURE ID: 4]

to a second party [FEATURE ID: 5]

authorized by the first party [FEATURE ID: 3]

by transmitting [TRANSITIVE ID: 2]

said first party ' s personal information from a server computer [FEATURE ID: 6]

operated by a service provider [FEATURE ID: 3]

, said server computer coupled [TRANSITIVE ID: 7]

to a database [FEATURE ID: 6]

, the method comprising [TRANSITIVE ID: 8]

the steps of : establishing [TRANSITIVE ID: 9]

an account [FEATURE ID: 10]

for the first party with the server computer : assigning [TRANSITIVE ID: 2]

an identifier [FEATURE ID: 11]

to the first party ; entering [TRANSITIVE ID: 9]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 12]

to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier [FEATURE ID: 13]

, the information object and the security level [FEATURE ID: 14]

assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects [FEATURE ID: 15]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier [FEATURE ID: 16]

; if the second party is not authorized to receive the information , recording the second party identifier ; and rejecting the second party ' [FEATURE ID: 17]

s request for information . 2 . The method of claim [FEATURE ID: 18]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number of requests that are not authorized ; and generating an alarm indication [FEATURE ID: 10]

. 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 10]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 12]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 19]

1 . A method [FEATURE ID: 1]

of transferring [TRANSITIVE ID: 2]

funds [FEATURE ID: 15]

from a first party [FEATURE ID: 3]

to a second party [FEATURE ID: 3]

, the method comprising [TRANSITIVE ID: 8]

: creating [TRANSITIVE ID: 9]

a variable authentication number ( VAN ) on a computer [FEATURE ID: 6]

using [TRANSITIVE ID: 8]

first information and a secret key [FEATURE ID: 5]

of the first party , the first information including [TRANSITIVE ID: 8]

an amount [FEATURE ID: 10]

and information [FEATURE ID: 12]

for identifying the first party or the second party , the VAN attesting [TRANSITIVE ID: 7]

to the authenticity [FEATURE ID: 13]

of the first party and the first information ; creating an instrument by the first party for transferring funds to the second party , the instrument including the first information and the variable authentication number ( VAN ) and attaching [TRANSITIVE ID: 2]

the VAN to the instrument . 2 . The method of claim [FEATURE ID: 18]

1 wherein a credential , including a second VAN [FEATURE ID: 13]

and a non-secret key [FEATURE ID: 14]

of the first party , was previously issued to the first party by an entity [FEATURE ID: 4]

authorized to issue a credential , the credential and the second VAN being used by the second party , or a third party [FEATURE ID: 5]

, to attest to the non-secret key belonging to the first party , the non-secret key from the credential being disseminated to the second party , or the third party , by joining the credential to the instrument . 3 . The method of claim 2 wherein a non-secret key of the credential issuing entity is appended to the credential and is disseminated to the second party , or the third party , the second [FEATURE ID: 17]

or third party using the non-secret key of the credential issuing entity , and the second VAN to determine whether the non-secret key of the first party belongs to the first party . 4 . The method of claim 1 wherein the secret key is obtained by the first party using a PIN [FEATURE ID: 16]

, or using descriptive details , of the first party . 5 . The method of claim 1 wherein the VAN is created by the first party using an error detection code [FEATURE ID: 10]

( EDC1 ) , and the first information is subsequently authenticated by the second party , or by a third party , the method further comprising : creating the EDC1 by coding the first information ; creating the VAN by coding the EDC1 using the first party ' [FEATURE ID: 3]

s secret key ; the second party , or the third party , subsequently obtaining the instrument and the VAN , and extracting the VAN and first information ; coding the first information to create an error detection code ( EDC2 ) ; uncoding the VAN to recover EDC1 using a non-secret key of the first party ; comparing the EDC1 with the EDC2 ; and the second party , or the third party , authenticating the first information if EDC1 and EDC2 correspond . 6 . The method of claim 1 wherein the form of the instrument is selected from the group comprising paper , plastic and electronic . 7 . The method of claim 1 wherein the first information includes information selected from the group comprising the first party ' s name [FEATURE ID: 11]

, the first party ' s account number [FEATURE ID: 13]

, the first party ' s bank name [FEATURE ID: 13]

, the first party ' s bank identification number , the first party ' s routing transit number [FEATURE ID: 13]

, the first party ' s error detection code EDC1 , the first party ' s variable authentication number ( VAN ) , the second party ' [FEATURE ID: 3]

s name , the second party ' s non-secret key , an amount , a date [FEATURE ID: 19]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5968152A
Filed: 1996-04-10
Issued: 1999-10-19
Patent Holder: (Original Assignee) Apple Computer Inc     (Current Assignee) Apple Inc
Inventor(s): Erik P. Staats

Title: Method and apparatus for extending key space in a plug and play ROM

[FEATURE ID: 1] methoddynamic method, communication method, software method, way, digital method, means, methodology[FEATURE ID: 1] method
[FEATURE ID: 2] personal information, information, criterioncontent, data, messages, file, notification, item, identifier[FEATURE ID: 2] extended value
[FEATURE ID: 3] second party, information object, second party 'client, user, record, receiver, destination, second, document[FEATURE ID: 3] Uniform Resource Locator, device driver, second node
[TRANSITIVE ID: 4] transmitting, assigning, enteringproviding, obtaining, receiving, displaying, collecting, communicating, loading[TRANSITIVE ID: 4] storing
[FEATURE ID: 5] server computer, service provider, first portionnetwork, server, processor, plurality, host, system, first[FEATURE ID: 5] bus, node
[TRANSITIVE ID: 6] coupledassociated, related, connected, linked, attached, belonging, joined[TRANSITIVE ID: 6] interconnected, according
[FEATURE ID: 7] databasenetwork, bus, server, communication, firewall, router, device[FEATURE ID: 7] protocol directory, system, communication link
[TRANSITIVE ID: 8] comprising, establishingproviding, including, being, comprises, includes, containing, defining[TRANSITIVE ID: 8] comprising, having, specifying
[FEATURE ID: 9] account, alarm indication, authorization keyidentification, identifier, entry, authorization, input, index, arrangement[FEATURE ID: 9] apparatus, hierarchical structure, unique directory ent
[FEATURE ID: 10] identifier, security levelinformation, attribute, authority, identification, image, icon, index[FEATURE ID: 10] extended key value
[FEATURE ID: 11] information objects, requestsentries, records, messages, persons, databases, files, documents[FEATURE ID: 11] directories
[FEATURE ID: 12] security levels, personal information objects, criteriaparameters, values, properties, credentials, characteristics, attributes, settings[FEATURE ID: 12] configuration information
[FEATURE ID: 13] partiesterminals, computers, units, stations, blocks, sections, components[FEATURE ID: 13] nodes, devices
[FEATURE ID: 14] first party identifierentry, name, number, identifier, record, value, key[FEATURE ID: 14] unique directory entry, directory entry
[FEATURE ID: 15] leastlest, lease, feast, most, last[FEATURE ID: 15] least
[FEATURE ID: 16] claimpreceding claim, either claim, any claim, item, paragraph, embodiment, clause[FEATURE ID: 16] claim
1 . A method [FEATURE ID: 1]

for automatically disbursing a first party ' s personal information [FEATURE ID: 2]

to a second party [FEATURE ID: 3]

authorized by the first party by transmitting [TRANSITIVE ID: 4]

said first party ' s personal information from a server computer [FEATURE ID: 5]

operated by a service provider [FEATURE ID: 5]

, said server computer coupled [TRANSITIVE ID: 6]

to a database [FEATURE ID: 7]

, the method comprising [TRANSITIVE ID: 8]

the steps of : establishing [TRANSITIVE ID: 8]

an account [FEATURE ID: 9]

for the first party with the server computer : assigning [TRANSITIVE ID: 4]

an identifier [FEATURE ID: 10]

to the first party ; entering [TRANSITIVE ID: 4]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 11]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 12]

to each information object [FEATURE ID: 3]

at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties [FEATURE ID: 13]

; storing in the database the first party identifier [FEATURE ID: 14]

, the information object and the security level [FEATURE ID: 10]

assigned to the information object ; receiving a request , said request comprising at least [FEATURE ID: 15]

the first party identifier ; in response to the request , selecting a first portion [FEATURE ID: 5]

of the first party ' s personal information objects [FEATURE ID: 12]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information [FEATURE ID: 2]

, recording the second party identifier ; and rejecting the second party ' [FEATURE ID: 3]

s request for information . 2 . The method of claim [FEATURE ID: 16]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number of requests [FEATURE ID: 11]

that are not authorized ; and generating an alarm indication [FEATURE ID: 9]

. 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 9]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 12]

, generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 2]

1 . An apparatus [FEATURE ID: 9]

comprising [TRANSITIVE ID: 8]

a bus [FEATURE ID: 5]

including a plurality of nodes [FEATURE ID: 13]

interconnected [TRANSITIVE ID: 6]

by a plurality of communication links , a first node for the plurality of nodes , the first node having [TRANSITIVE ID: 8]

an associated configuration memory for storing [TRANSITIVE ID: 4]

configuration information [FEATURE ID: 12]

, the configuration memory being arranged into a plurality of directories [FEATURE ID: 11]

according [TRANSITIVE ID: 6]

to an hierarchical structure [FEATURE ID: 9]

, at least one of directories being a device driver directory the device driver directory specifying [TRANSITIVE ID: 8]

a Uniform Resource Locator [FEATURE ID: 3]

( URL ) in which a device driver [FEATURE ID: 3]

is found . 2 . An apparatus comprising : a plurality of nodes interconnected by a plurality of communication links ; a first node of the plurality of nodes having an associated configuration memory to store configuration information ; and said configuration memory arranged in a plurality of directories , at least one of the directories having a key value , the key value indicating a unique directory entry [FEATURE ID: 14]

within the configuration memory , the unique directory entry comprising an extended key value [FEATURE ID: 10]

. 3 . The apparatus of claim [FEATURE ID: 16]

2 , wherein the apparatus comprises digital and analog systems . 4 . The apparatus of claim 3 , wherein at least one of the directories having at least one leaf , the extended key value stored within the leaf . 5 . The apparatus of claim 3 , wherein the extended key value specifies a device driver directory . 6 . The apparatus of claim 3 , wherein the extended key value specifies a protocol directory [FEATURE ID: 7]

. 7 . A method [FEATURE ID: 1]

of providing plug and play capabilities in a system [FEATURE ID: 7]

comprising : providing a node [FEATURE ID: 5]

in a plurality of devices [FEATURE ID: 13]

in the system ; providing a first node in the plurality of nodes , an associated configuration memory to store configuration information ; and arranging the configuration memory in a plurality of directories , at least one of the directories having a key value , the key value indicating a unique directory entry within the configuration memory , the unique directory ent [FEATURE ID: 9]

comprising an extended key value . 8 . The method of claim 7 , further comprising : providing a leaf in the directory ; and storing the extended value [FEATURE ID: 2]

within the leaf . 9 . The method of claim 7 , wherein the extended key value specifies a device driver directory . 10 . The method of claim 7 , wherein the extended key value specifies a protocol directory . 11 . An apparatus comprising : a first node adapted to be interconnected by a communication link [FEATURE ID: 7]

to a second node [FEATURE ID: 3]

; said first node having an associated configuration memory to store configuration information ; and said configuration memory arranged in a plurality of directories , at least one of the directories having a key value , the key value indicating a unique directory within the configuration memory , the directory entry [FEATURE ID: 14]

comprising an extended key value . 12 . The apparatus of claim 11 , wherein the apparatus is at least [FEATURE ID: 15]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: EP0949782A2
Filed: 1998-03-13
Issued: 1999-10-13
Patent Holder: (Original Assignee) Canon Inc     (Current Assignee) Canon Inc
Inventor(s): Naohisa Suzuki, Atsushi Nakamura, Makoto Kobayashi, Kiyoshi Katano

Title: Information processing apparatus and method

[FEATURE ID: 1] personal informationservice, call, transaction, information, data[FEATURE ID: 1] communication
[TRANSITIVE ID: 2] transmitting, enteringobtaining, loading, gathering, reading, requesting, collecting, receiving[TRANSITIVE ID: 2] acquiring
[TRANSITIVE ID: 3] coupledlinked, related, belonging, attached, joined, provided, associated[TRANSITIVE ID: 3] connected, unique
[FEATURE ID: 4] databasenetwork, printer, router, keyboard, function, scanner, system[FEATURE ID: 4] serial bus, protocols, printer function, facsimile function
[TRANSITIVE ID: 5] comprisingincluding, involving, has, containing, providing, having, comprises[TRANSITIVE ID: 5] comprising
[FEATURE ID: 6] information objects, requestsinformation, entries, messages, pages, elements, documents, addresses[FEATURE ID: 6] names
[FEATURE ID: 7] security levels, personal information objects, criteriarules, parameters, values, data, restrictions, characteristics, items[FEATURE ID: 7] search conditions
[FEATURE ID: 8] portionsinformation, objects, elements, ones, items[FEATURE ID: 8] devices
[FEATURE ID: 9] first party identifieridentification, data, information, indicator, number[FEATURE ID: 9] information indicative
[FEATURE ID: 10] security levelclassification, category, attribute, resolution, identifier, hierarchy, priority[FEATURE ID: 10] location
[FEATURE ID: 11] leastlest, lease, feast, most, last[FEATURE ID: 11] least
[FEATURE ID: 12] first portion, numberset, plurality, group, list, part, category, size[FEATURE ID: 12] range
[FEATURE ID: 13] informationrequest, data, transfer, file, content, communication[FEATURE ID: 13] function
[FEATURE ID: 14] claimclam, figure, clause, paragraph, item[FEATURE ID: 14] claim
[FEATURE ID: 15] authorization keyaccess, identification, instruction, input, information, authentication[FEATURE ID: 15] acquisition
1 . A method for automatically disbursing a first party ' s personal information [FEATURE ID: 1]

to a second party authorized by the first party by transmitting [TRANSITIVE ID: 2]

said first party ' s personal information from a server computer operated by a service provider , said server computer coupled [TRANSITIVE ID: 3]

to a database [FEATURE ID: 4]

, the method comprising [TRANSITIVE ID: 5]

the steps of : establishing an account for the first party with the server computer : assigning an identifier to the first party ; entering [TRANSITIVE ID: 2]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 6]

; assigning , by the first party , at least one of a plurality of security levels [FEATURE ID: 7]

to each information object at any granularity , thereby enabling access to individually selected portions [FEATURE ID: 8]

of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier [FEATURE ID: 9]

, the information object and the security level [FEATURE ID: 10]

assigned to the information object ; receiving a request , said request comprising at least [FEATURE ID: 11]

the first party identifier ; in response to the request , selecting a first portion [FEATURE ID: 12]

of the first party ' s personal information objects [FEATURE ID: 7]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information [FEATURE ID: 13]

, recording the second party identifier ; and rejecting the second party ' s request for information . 2 . The method of claim [FEATURE ID: 14]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number [FEATURE ID: 12]

of requests [FEATURE ID: 6]

that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 15]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria [FEATURE ID: 7]

1 An image processing apparatus comprising [TRANSITIVE ID: 5]

: acquisition [FEATURE ID: 15]

means for acquiring [TRANSITIVE ID: 2]

device information from a memory of a device connected [TRANSITIVE ID: 3]

to a serial bus [FEATURE ID: 4]

, wherein the device information being related to the device and read only through the serial bus ; setting means for setting search conditions [FEATURE ID: 7]

for searching for devices [FEATURE ID: 8]

connected to said serial bus ; and control means for generating a list of devices meeting the set search conditions , based on the device information acquired by said acquisition means . 2 The apparatus according to claim [FEATURE ID: 14]

1 , wherein in said list , names [FEATURE ID: 6]

respectively unique [FEATURE ID: 3]

to the devices are used . 3 The apparatus according to claim 1 , wherein said device information includes at least information indicative of location [FEATURE ID: 10]

of the device and information indicative [FEATURE ID: 9]

of hierarchical position of the device . 4 The apparatus according to claim 1 , wherein said device information includes at least capability information indicative of capability of the device . 5 The apparatus according to claim 4 , wherein said capability information includes at least information on a range [FEATURE ID: 12]

of handled capability information , transfer capability information in function [FEATURE ID: 13]

- based communication [FEATURE ID: 1]

, and function - based application capability information . 6 The apparatus according to claim 5 , wherein said transfer capability information in function - based communication is information indicative of communication protocols of the device , and information indicating whether or not a plurality of communication protocols can be simultaneously supported or information indicative of use priority of the protocols [FEATURE ID: 4]

. 7 The apparatus according to claim 1 , wherein said device information includes at least function information indicative of a function of the device . 8 The apparatus according to claim 7 , wherein the function of the device indicated by said function information includes at least [FEATURE ID: 11]

one of a printer function [FEATURE ID: 4]

, a facsimile function [FEATURE ID: 4]








Targeted Patent:

Patent: US6845448B1
Filed: 2000-01-07
Issued: 2005-01-18
Patent Holder: (Original Assignee) Pennar Software Corp     (Current Assignee) PENNER SOFTWARE Corp ; Pennar Software Corp
Inventor(s): Naren Chaganti, Sitapathi Rao Chaganti, Damayanti Chaganti

Title: Online repository for personal information

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5953050A
Filed: 1995-11-27
Issued: 1999-09-14
Patent Holder: (Original Assignee) Fujitsu Ltd     (Current Assignee) Fujitsu Ltd
Inventor(s): Hajime Kamata, Youichi Ashida

Title: Multi-location video conferencing system

[FEATURE ID: 1] method, second party, server computersystem, computer, terminal, technique, site, portion, network[FEATURE ID: 1] device
[TRANSITIVE ID: 2] disbursing, establishingproviding, transmitting, receiving, supplying, transferring, assigning, generating[TRANSITIVE ID: 2] sending, storing
[FEATURE ID: 3] personal information, information object, request, personal information objects, information, requests, authorization keydata, messages, notification, call, output, objects, identifier[FEATURE ID: 3] image data, images, signal
[TRANSITIVE ID: 4] authorized, individualdesired, selected, designated, said, received, respective, authenticated[TRANSITIVE ID: 4] corresponding
[TRANSITIVE ID: 5] transmitting, assigning, enteringproviding, receiving, obtaining, selecting, sending, displaying, reading[TRANSITIVE ID: 5] combining, reducing
[TRANSITIVE ID: 6] saidthe, that, such, this[TRANSITIVE ID: 6] said
[TRANSITIVE ID: 7] operatedlocated, installed, supplied, used[TRANSITIVE ID: 7] provided
[TRANSITIVE ID: 8] coupledadapted, related, connected, linked[TRANSITIVE ID: 8] responsive
[FEATURE ID: 9] databasecommunication, camera, lan, display, network, client, system[FEATURE ID: 9] multi-location video conferencing system, speaker '
[TRANSITIVE ID: 10] comprisingincluding, by, having, comprises, includes, performing, and[TRANSITIVE ID: 10] comprising, using
[FEATURE ID: 11] identifierinformation, address, image, attribute[FEATURE ID: 11] image arrangement
[FEATURE ID: 12] information objectsfields, words, images, portions[FEATURE ID: 12] memory locations
[FEATURE ID: 13] granularitytime, occasion, location, point[FEATURE ID: 13] screen
[FEATURE ID: 14] portionsregions, objects, areas, fields[FEATURE ID: 14] pixels
[FEATURE ID: 15] partiesusers, units, participants, clients, subscribers, systems, points[FEATURE ID: 15] video conference terminals, locations, terminals
[FEATURE ID: 16] first portion, number, criterionvalue, plurality, quantity, range, predetermined, group, amount[FEATURE ID: 16] composite image, reduction ratio, position
[FEATURE ID: 17] claimpreceding claim, figure, invention, clause, paragraph, item, to claim[FEATURE ID: 17] claim
1 . A method [FEATURE ID: 1]

for automatically disbursing [TRANSITIVE ID: 2]

a first party ' s personal information [FEATURE ID: 3]

to a second party [FEATURE ID: 1]

authorized [TRANSITIVE ID: 4]

by the first party by transmitting [TRANSITIVE ID: 5]

said [TRANSITIVE ID: 6]

first party ' s personal information from a server computer [FEATURE ID: 1]

operated [TRANSITIVE ID: 7]

by a service provider , said server computer coupled [TRANSITIVE ID: 8]

to a database [FEATURE ID: 9]

, the method comprising [TRANSITIVE ID: 10]

the steps of : establishing [TRANSITIVE ID: 2]

an account for the first party with the server computer : assigning [TRANSITIVE ID: 5]

an identifier [FEATURE ID: 11]

to the first party ; entering [TRANSITIVE ID: 5]

the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects [FEATURE ID: 12]

; assigning , by the first party , at least one of a plurality of security levels to each information object [FEATURE ID: 3]

at any granularity [FEATURE ID: 13]

, thereby enabling access to individually selected portions [FEATURE ID: 14]

of the first party ' s personal information by individual [FEATURE ID: 4]

receiving parties [FEATURE ID: 15]

; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request [FEATURE ID: 3]

, said request comprising at least the first party identifier ; in response to the request , selecting a first portion [FEATURE ID: 16]

of the first party ' s personal information objects [FEATURE ID: 3]

that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects ; securely transmitting the retrieved first portion of personal information objects to the second party ; obtaining a second party identifier ; if the second party is not authorized to receive the information [FEATURE ID: 3]

, recording the second party identifier ; and rejecting the second party ' s request for information . 2 . The method of claim [FEATURE ID: 17]

1 , further comprising the steps of : designating the second party as a junk requester if the second party presents a predetermined number [FEATURE ID: 16]

of requests [FEATURE ID: 3]

that are not authorized ; and generating an alarm indication . 3 . A method for automatically disbursing a first party ' s personal information to a second party authorized by the first party by transmitting said first party ' s personal information from a server computer operated by a service provider , said server computer coupled to a database , the method comprising the steps of : establishing an account for the first party with the server computer ; assigning an identifier to the first party ; entering the first party ' s personal information , said first party ' s personal information comprising at least one of a plurality of information objects ; assigning , by the first party , at least one of a plurality of security levels to each information object at any granularity , thereby enabling access to individually selected portions of the first party ' s personal information by individual receiving parties ; storing in the database the first party identifier , the information object and the security level assigned to the information object ; receiving a request , said request comprising at least the first party identifier ; in response to the request , selecting a first portion of the first party ' s personal information objects that could be transmitted to a second party ; retrieving from the database the selected first portion of personal information objects , securely transmitting the retrieved first portion of personal information objects to the second party ; generating an authorization key [FEATURE ID: 3]

; providing the authorization key to the second party ; and encoding the authorization key with at least one of a plurality of criteria , generating an authorization key ; providing the authorization key to the second party ; wherein the at least one of a plurality of criteria includes a criterion [FEATURE ID: 16]

1 . In a multi-location video conferencing system [FEATURE ID: 9]

a multi-image combining [TRANSITIVE ID: 5]

device [FEATURE ID: 1]

for combining image data [FEATURE ID: 3]

sent from video conference terminals [FEATURE ID: 15]

at a plurality of locations [FEATURE ID: 15]

into a composite image [FEATURE ID: 16]

and sending [TRANSITIVE ID: 2]

back said [TRANSITIVE ID: 6]

composite image to said terminals [FEATURE ID: 15]

comprising [TRANSITIVE ID: 10]

: first image reduction and storage means , provided [TRANSITIVE ID: 7]

for each of said terminals , for reducing [TRANSITIVE ID: 5]

an image sent from a corresponding [TRANSITIVE ID: 4]

one of said terminals using [TRANSITIVE ID: 10]

a reduction ratio [FEATURE ID: 16]

for a speaker ' [FEATURE ID: 9]

s image and storing [TRANSITIVE ID: 2]

a reduced image ; second image reduction and storage means , provided for each of said terminals , for reducing an image sent from a corresponding one of said terminals using a reduction ratio for a non-speaker ' s image and storing a reduced image ; image readout control means , provided for each of said second image reduction and storage means , for controlling the reading of said reduced image from a corresponding one of said second image from a corresponding one of said second image reduction and storage means reduction and storage means so that a plurality of images identical to said reduced image are displayed on one screen [FEATURE ID: 13]

; and image selecting and combining means for selectively outputting one of an output of said first image reduction and storage means and an output of said second image reduction and storage means which are read under the control of said image readout control means for each of pixels [FEATURE ID: 14]

forming a composite image to thereby combine images [FEATURE ID: 3]

from said terminals into said composite image , said composite image being sent back to said terminals . 2 . The system according to claim [FEATURE ID: 17]

1 , wherein said image selecting and combining means includes select memory means for storing data as to which output of said first and second image reduction and storage means is to be selected in memory locations [FEATURE ID: 12]

corresponding in position [FEATURE ID: 16]

to pixels in said composite image , and said multi-image combining device further comprises control means for storing said data into said select memory means . 3 . The system according to claim 2 , wherein said control means is responsive [FEATURE ID: 8]

to an image arrangement [FEATURE ID: 11]

specify signal [FEATURE ID: 3]