Exchanging goods over the internet - System and method of conducting on-line auctions - System and methods for providing a health care industry trade show via internet - Managing credit inquiries within account receivables - Formulating an investment strategy for real estate investments - Evaluating long-term average portfolio risk and return for cyclical corporation - Conducting a financial analysis - Multi-note method and system for loans based upon lease revenue stream - Secure distribution of software/data - Indicator system for screening protected material - Contents managing method and contents managing apparatus - Certifying public keys used to sign postal indicia and indicia so signed - The authentication of integrated circuits - Alternative encryption techniques

Method of exchanging goods over the internet

A method and system is taught for coordinating the exchange of goods between parties over a communications network such as the internet. Users of the system can interact with a central computer to input data regarding items that they offer for exchange, as well as search criteria describing items that they would like to receive in exchange. A processor in the central computer searches records stored in a database to find and sort those records that satisfy the user's search criteria. A second test is then be performed to determine whether the information that the user input describing the item offered for exchange satisfies search criteria within the record. As a result, a match may be generated between two users who have input complementary criteria. The invention can also accommodate more complex exchanges between three or more parties.

Moore, Donna R.
January 25, 02005
#6847938

Document online
Top


System and method of conducting on-line auctions

A system for conducting on-line auctions of products is disclosed. The system comprises (a) a database server system being for storing and providing on demand, information pertaining to a plurality of products to be auctioned, the database server system further being for receiving a number of bids on a product of the plurality of products when the product is auctioned, the number of the bids received being for determining a quantity of the product auctioned; and (b) a plurality of user clients each being operable by a specific user and each being for establishing communication with the database server system, each of the plurality of user clients being for receiving from the database server system information pertaining to the product auctioned and for relaying to the database server system a bid on the product auctioned.

Shemesh, Yair
Olsale.com Ltd.; January 25, 02005
#6847939

Document online
Top


System and methods for providing a health care industry trade show via internet

This invention will serve as a new worldwide platform for "business-to-business" and "business-to-participants" tradeshows occurring in the healthcare industry via the Internet 24 hours a day. One embodiment of the invention is a system or method for providing a healthcare industry trade show via internet including at least one personal or network computer for collecting, assembling, storing, correlating, or otherwise processing information desired by a participant of the healthcare industry, and at least one other computer used by the participant of the healthcare industry connected via internet or intranet to conduct transactions with other participants or exhibitors of the healthcare industry trade show. Another embodiment includes at least one of the communication vehicles to be used at the option of the participant of the healthcare industry. Another embodiment provides optional features including a booth with multiple rooms; a tradeshow Concierge; instant audio and/or video announcements via eLERTS; direct selling via detailing; a Pop-Up system of interaction with experts and Attendees on the convention floor; opportunities for participants to gain insights into treatment via presentation of case reports; the use of special advisory panels assessing the needs of participants and create education programs.

Shelton, John S.; Brown, H. Stephen
January 25, 02005
#6847940

Document online
Top


Method and apparatus for managing credit inquiries within account receivables

The Accounts Receivable System's Credit Inquiry Module reviews payment history and performs credit inquiries by analyzing data from internal and external sources. The Credit Inquiry Module uses this analysis for credit management and customer contact. The Credit Inquiry Module based on customer payment data predicts overall cash forecasting for the client. The Credit Inquiry Module is utilized for account reconciliation and audit verification for tracking transactions at the customer level.

Land, David MacLeod; Getgood, Alan Bruce
General Electric Canada Equipment Finance G.P.; January 25, 02005
#6847942

Document online
Top


Method for formulating an investment strategy for real estate investments

The method discloses a rule-based decision process which formulates an investment strategy in terms of short term debt, long term debt, short term equity, and/or long term equity for a variety of property types and geographic markets. The first phase of the method achieves a visual representation of the condition of each of a selected territory's major markets, showing market direction and volatility determined on the basis of commercially available market research data which has been adjusted by the investing entity in light of actual local experience in the market. The second phase deals with the implications of the first phase results on four possible alternative investment types, namely, short term debt, long term debt, short term equity, and/or long term equity. This is accomplished by formulating a set of decision rules which enable the individual investors of the investing entity to uniformly evaluate specific types of investment for each property type in a respective market area. The result is again graphically portrayed so that the investing entity can easily formulate an actionable real estate investment strategy expressed in terms of investment types (namely, short term debt, long term debt, short term equity, and/or long term equity), for each market/property pair.

Dubner, Peter H.
G. E. Capital Corporation; January 25, 02005
#6847943

Document online
Top


Method of evaluating long-term average portfolio risk and return for cyclical corporation

A method of evaluating long-term average portfolio risk and return for a cyclical corporation includes the steps of obtaining historical pricing information for financial instruments used for a relevant historical period and dividing the relevant historical period up into time segments. The method also includes calculating a gain or loss for each financial instrument in a portfolio for the time segments over the relevant historical period and obtaining actual cash level for each time segment and dividing up the actual cash level of the corporation between asset classes to determine what the portfolio is invested in. The method further includes the steps of determining an average return and risk for a typical one of the time segments over the historical period and using an optimization framework to pick out the most efficient portfolios in risk versus return.

Tosh, Dennis Alan; Everson, Mark Paul
Ford Global Technologies, LLC; January 25, 02005
#6847944

Document online
Top


Method for conducting a financial analysis

A method is disclosed for conducting a financial analysis. The method includes creating a financial analysis utility having a standardized format, and providing access through a communication network to the financial analysis utility to employees of a business enterprise. Thus, the present invention provides a single source for the financial analysis utility.

Jarvis, Colin; Wakefield, Daphne; Haag, Janis; Thai-Tang, Nam; Wajroch, Manfred; Przybocki, Peter; Lougovier, Serguei A.; Mei, Michael R.
Ford Motor Company; January 25, 02005
#6847945

Document online
Top


Multi-note method and system for loans based upon lease revenue stream

A method, system and program product for creating a loan from a revenue stream from a lessee, the method comprising the steps of: determining a revenue stream from a lease of a leased tangible asset; calculating a Breakeven TA Note Rate, and a TA Note Amount for a TA Note based on a Multi-Note Loan Coupon, a TA Note Debt Service and market determined underwriting parameters for the tangible asset; calculating an CL Note Debt Service after the TA Note debt service, and other appropriate amounts, if necessary are subtracted from the revenue; calculating a Breakeven CL Note Rate and a CL Note Amount for a CL Note based on the calculated CL Note Debt Service, the Multi-Note Loan Coupon, a CL Note Debt Service, and market determined underwriting parameters; creating a file structure of one or more files for the TA Note and the CL Note; and associating the TA Note and CL Note to assign priorities for purposes of determining and distributing recoveries to holders of the TA Note and/or the CL Note and/or their designees in the event of a Multi-Note Loan default and allocating the rights and responsibilities of the holders of such notes. In a preferred embodiment, the Multi-Note Loan Coupon is initially an estimated value.

Blanz, Robert Charles; Gartner, Robert James
Capital Lease Funding LLC; January 25, 02005
#6847946

Document online
Top


Method and apparatus for secure distribution of software/data

A method and apparatus is disclosed for preventing an unauthorized computer system from using copied software or data. An identification code provided by a client computer is combined with a pre-determined number provided by the source of software or data to be copied to generate at least one unique encryption key. Prior to each use the encrypted program re-derives the original encryption key, which includes the identification code of the client computer, to decrypt the critical files prior to use. The identification code may be a unique identifier associated with the client computer such as a network identifier or a processor ID provided by the client computer.

Paolini, Michael A.; Dutta, Rabindranath
International Business Machines Corporation; January 25, 02005
#6847948

Document online
Top


Indicator system for screening protected material

Copy-protected content material is screened for an indication of the availability of an enhanced version of a screening system and forcing an upgrade to the advanced screening system by refusing to process the copy-protected content material until the upgrade is preformed. When security standards change, and corresponding security techniques are available for downloading to existing consumer devices, newly published content material will contain an indication to that effect. When the newly published content material is processed by an existing consumer device, the consumer device will detect this indication of an available update, and will prevent the processing of this newly published content material until the update is received. In this manner, a phased approach to enhanced security can be effected.

Epstein, Michael
Koninklijke Philips Electronics N.V.; January 25, 02005
#6847949

Document online
Top


Contents managing method and contents managing apparatus

A contents managing method of regulating a number of copied contents storable on a storage medium includes giving a predetermined number of copyable contents for each content, recording the copied contents on the storage medium upon reception of an instruction for copy recording on the storage medium when there is a remainder in the number of copyable contents, decrementing the number of copyable contents by "1" every time one copied content is recorded on the storage medium at a time of recording, and incrementing the number of copyable contents by "1" every time one copied content is erased from the storage medium upon reception of an instruction to erase the copied contents from the storage medium.

Kamibayashi, Toru; Tamura, Masafumi; Kato, Taku; Ishibashi, Yasuhiro; Yamada, Hisashi; Toma, Hideyuki
Kabushiki Kaisha Toshiba; January 25, 02005
#6847950

Document online
Top


Method for certifying public keys used to sign postal indicia and indicia so signed

A method for certifying the public key of a digital postage meter using a public key encryption system by a certifying authority. A certifying station and a user station, or a digital postage meter, exchange information and the user station and downloads, or the meter derives, a public key from the exchanged information. The certifying station also publishes related information and its public key. A third party can derive the public key corresponding to the meter's private key by operating on the published information with the certifying station public key.

Cordery, Robert A.; Pintsov, Leon A; Vanstone, Scott A
Pitney Bowes Inc.; January 25, 02005
#6847951

Document online
Top


Method and apparatus for the authentication of integrated circuits

A method for the authentication of an integrated circuit in an application system comprises, for the integrated circuit: detecting an activation scenario, and then modifying at least one of its responses. The application system implements an application program which sends instructions to the integrated circuit. The activation scenario is contained in the sequence of instructions received from the application program. The modification causes no malfunction of the integrated circuit in the application system, and therefore does not put the integrated circuit out of operation. A complementary method for the application system comprises: detecting an activation scenario; measuring the response of the integrated circuit to the activation scenario; verifying the response if it has been modified correctly by the integrated circuit; and authenticating the integrated circuit if the response is verified.

Tailliet, Francois
STMicroelectronics S.A.; January 25, 02005
#6848049

Document online
Top


System and method for alternative encryption techniques

A system and method for verifying the identification of a user and securely establishing an encryption key for a communication between the user and a verifying entity, such as a bank, which makes use of the numeric value of the user's personal identification number (PIN) known only to the user and the bank and resolves the man-in-the-middle problem. The system and method replaces a public parameter with the customer's PIN to provide an encryption mechanism that is less complex than existing protocols. Use of the protocol enables new products and improvement of existing products using a service access device and service access device interface, including, for example, self-service terminals.

Merman, Michael; Smushkovich, Yosif
Citicorp Development Center, Inc.; January 25, 02005
#6848050

Document online
Top

Patent Alert

 

Back