Abstract:
A skylight leakage barrier for reducing the tendency of a skylight assembly to leak during heavy rainstorms. The skylight leakage barrier has a generally vertical top barrier which extends across the top edge of the skylight assembly. The top barrier has two downwardly depending side barriers and the top barrier and side barriers are separated from the skylight assembly by a distance of several inches. The result of the use of the leakage barrier is a substantial reduction in the tendency of the skylight assembly to leak during heavy rainstorms.
Abstract:
Disclosed is a tamper evident backing system, comprising an adhesive backing, the adhesive backing having a main body and sectioned portions, wherein the adhesive backing includes an outer surface is configured to adhere to a second surface, and wherein upon removal of an attached adhesive backing, said sectioned portions are configured to detach from main body and remain on said second surface.
Abstract:
Disclosed is a package handling system comprising: an indicator designed to display a mishandling indication upon application of a force in excess of a predetermined threshold force.
Abstract:
A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.
Abstract:
A method and apparatus for verifying players' bets on a gaming table is comprised of a system that can detect the monetary value of a wager that is placed by a particular player at a gaming table. Once all betting is finalized, the detected monetary value of the players' bets is locked and/or recorded thereby preventing that value from being changed by the addition or removal of betting chip(s) from a player's respective bet. If after the results of the gaming round, there is a discrepancy or mismatch between a player's wager and the locked monetary value of a player's bet, casino personnel will be alerted of the player's possible cheating practices thereby enabling them to investigate the matter. 36
Abstract:
A method and system for preventing piracy of a given software application which makes use of a communications network, such as the Internet. A given software application, when initially installed on a user system, is non-functional until activated by a remote service provider. The user must provide the remote service provider with user data, such as the user's personal identity information and the unique software identification code relating to the specific software. User data is compared to archived data to determine if the user is a pirator of the software. If the user is not a pirator, then the remote service provider transmits service data, such as an activation code, to the user system. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.
Abstract:
A method and system for prevention of piracy of a given software application via a communications network, such as the Internet. A given software application, installed on a user system, will not function until it is activated by a remote service provider. This will require the user to provide the remote service provider with user data, such as the user's personal identity information and the unique software identification code relating to the specific software. User data will then be compared to archived data in order to determine if the user is a pirator of the software. If not a pirator, the remote service provider may transmit undisclosed service data, such as a software activation code, to the user system. Once activated, the software will become fully operational and allow the user complete access to its functions. In this manner, piracy of a given software application can be prevented.
Abstract:
An enhanced parking meter system utilizing user identification technology to achieve improved efficiencies in the enforcement and regulation of parking meters. A user and/or vehicle is identified by communication of user data into the parking meter system. If the meter becomes expired with the vehicle remaining in the parking space, a citation will be electronically processed, in accordance with the user data, and thereafter delivered to the user or vehicle owner. Recognition of the user and/or vehicle further enables the system to limit the individual's and/or vehicle's parking time in front of a particular meter or designated cluster of meter. This would help regulate traffic within a municipality district as well as prevent people from parking in a metered location for excessive periods of time.
Abstract:
A holding device for keeping a cigarette lighter and other compact objects in an abutting manner to a cigarette box. The holding device is attached to a medium which contains a message. Once attached to the cigarette box, the holding device may grip a user's peripheral items close to the box, while displaying the message resident on the medium. In this respect, the user would be able to keep their items within close reach. Additionally, the user and others would be subject to viewing the message whenever the medium is exposed. The medium may further be made independent of the holding device and attachable to the cigarette box for the sole purpose of conveying the message contained therein. Electronic elements for presenting an electronically visual, audible, and/or mechanical message may produce a more noticeable message in addition to providing added functional utility.