Abstract:
Disclosed is a package handling system comprising: an indicator designed to display a mishandling indication upon application of a force in excess of a predetermined threshold force.
Abstract:
A method and system for confirming proper receipt of an e-mail file sent by a sending party over a communications network such as the Internet and intended to be received by a target party. The e-mail file sent by the sending party is properly or improperly delivered to a recipient e-mail address and stored in a data storage location of a recipient computer system. When the accessing party, who may or may not be the intended target party, accesses either the e-mail file itself or an e-mail processing program or user account, various recipient information, including identity information associated with the accessing party, is discovered from the recipient computer system and included in a generated confirmation of receipt notice. The confirmation of receipt notice is subsequently and automatically return transmitted to the sending party. In one embodiment, an attachment file is transmitted together with the e-mail which operates to discover and obtain the recipient data, generate the confirmation of receipt notice, and transmit the confirmation of receipt notice to the sending party. In this manner, the sending party can determine whether the accessing party who actually received and was notified of the e-mail file was in fact the intended target party, and thereby determine whether delivery was proper.
Abstract:
A method and system for auctioning bad debts utilizing a sorting arrangement based on the geographic location where jurisdiction is present over the debtor. Clients in the public may remotely access and participate in an online auction forum for the purpose of buying bad debts. Bad debts may be classified into a designated location bidding site database that relates to a particular geographic location. A designated location bidding site that that is related to the same geographic location as that of the database may rotatively display bad debts for buyers wishing to view or bid on them. In this manner, creditors may sell bad debts they own by being able to easily and more effectively, locate buyers who are situated in or near a territorial location that has jurisdiction over the debtor.
Abstract:
An adapter for converting a foldable pet shelter into a self encased pet crate. The crate adapter has an end panel and a bottom panel, both of which may be joined together. The end panel is removably attachable to the foldable pet shelter along the back edge perimeter of the left side, right side, and top panels of the foldable pet shelter, while the bottom panel is removably attachable to the foldable pet shelter along the bottom edge perimeter of the left side, right side, and front side panels of the foldable pet shelter. Component lock elements positioned along various locations on the end and bottom panels of the adapter provide elements for removably securing the adapter to the foldable pet shelter, thereby converting the joined components into a self encased pet crate having a top panel, a right side panel, a left side panel, a front panel, a back panel, and a bottom panel.
Abstract:
A method and system for real estate marketing allows individuals from the general public to gain access to a real estate property that is placed for sale or lease for the purpose of inspection. Access to the real estate property may be granted to requesting individuals who hold valid user accounts with a Remote Service Provider which can authorize such access. Access to inspect real estate property may be granted based on a charged fee basis and can be monitored via video and/or audio surveillance equipment to safeguard against vandalism and/or inappropriate conduct at the property location.
Abstract:
A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.
Abstract:
A method and apparatus for verifying players' bets on a gaming table is comprised of a system that can detect the monetary value of a wager that is placed by a particular player at a gaming table. Once all betting is finalized, the detected monetary value of the players' bets is locked and/or recorded thereby preventing that value from being changed by the addition or removal of betting chip(s) from a player's respective bet. If after the results of the gaming round, there is a discrepancy or mismatch between a player's wager and the locked monetary value of a player's bet, casino personnel will be alerted of the player's possible cheating practices thereby enabling them to investigate the matter.
Abstract:
A method and system for mass-generating new or modified designs of products and other items over a communications network, such as the Internet. Users in the public may remotely access and run a computer design program on a remote host system where they may select and manipulate product parts for designated products, in order to create a new design for planned or existing products. Additionally, an award incentive is preferably provided to winning designs. In this manner, the remote host computer system may collect a multitude of design submissions from a great number of users.
Abstract:
A method and system for verifying that an electronic communication is sent to the intended recipient prior to the communication actually being sent comprises: detecting a recipient name in a body of the communication and determining whether the detected recipient name is a match or potential mismatch with a destination indication or name associated with the destination indication.
Abstract:
A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.