1461177890-a9f22c51-c233-42d0-bc0e-2c2923ecd9fb

1. A method for auditing access of one or more resources by a client, the method comprising:
receiving at a single sign-on server from the client a request to access one or more of the resources;
assigning with the single sign-on server a session identifier to a user of the client requesting to access one or more of the resources, the session identifier associated with a user identifier for the user of the client;
recording the session identifier and user identifier with the single sign-on server in a sign-on repository maintained by the single sign-on server;
providing the user identifier and session identifier to the client from the single sign-on server;
redirecting the client from the single sign-on server to a server of a plurality of servers other than the single sign-on server;
providing the user identifier and session identifier to one or more applications managing the one or more resources requested by the client, the one or more applications executed by the server other than the single sign-on server and wherein each of the plurality of servers further executes a logging agent and wherein each logging agent records in a central log data repository a record of each access of the one or more resources managed by the one or more applications of the server executing the logging agent, wherein the central log data repository is separate from the sign-on repository;
accessing the one or more resources requested by the client with the one or more applications based on the request;
logging a record of said accessing of the one or more resources requested by the client in the central log data repository with the logging agent of the server executing the one or more applications managing the one or more resources requested by the client, wherein the record includes the user identifier and the session identifier;
reading with an auditor system a plurality of records of said accessing of the one or more resources from the central log repository;
correlating with the auditor system two or more of the plurality of records of said accessing of the one or more resources based on the user identifier and session identifier of each of the plurality of records;
determining with the auditor system, based on the correlated two or more records and a set of rules defining prohibited activity, whether a prohibited activity is being performed by a user with more than one active session, wherein the set of rules defining prohibited activity is maintained by the auditor system and defines patterns of actions related to malicious activity and wherein determining whether a prohibited activity is being performed comprises comparing the correlated two or more records to the set of rules.
2. The method of claim 1, wherein assigning the session identifier to the user of the client further comprises:
determining based on the session identifier and user identifier recorded in the sign-on repository whether a session identifier has already been assigned to the user of the client; and
responsive to determining a session identifier has already been assigned to the user of the client, invalidating a previous session identifier associated with the user identifier for the user of the client and assigning a new session identifier to the user.
3. The method of claim 2, wherein accessing the one or more resources requested by the client further comprises determining whether the user of the client is authorized to access the one or more resources requested by the client in a manner requested based on the user identifier and validity of the session identifier.
4. The method of claim 2, wherein providing the user identifier and session identifier to the one or more applications managing the one or more resources comprises:
generating a redirection request with the single sign-on server, the redirection request including the session identifier and an indication of a location of the resource; and
sending the redirection request from the single sign-on server to the client.
5. The method of claim 1, wherein each record further includes a timestamp indicating a time said accessing the one or more resources is performed.
6. The method of claim 5, wherein each record further includes an indication of a type of access requested to be performed on the one or more resources by the client.
7. The method of claim 6, wherein each record further includes an indication of the one or more resources requested by the client.
8. The method of claim 7, wherein each record further includes an indication of a result of said accessing of the one or more resources requested by the client.
9. The method of claim 8, further comprising:
responsive to determining that a prohibited activity is being performed, taking corrective action with the auditor system.
10. The method of claim 1, further comprising authenticating the user of the client prior to assigning the sign-on identifier to the user of the client.
11. A system comprising:
a central log data repository;
a sign-on repository separate from the central log data repository;
a client;
a single sign-on server communicatively coupled with the client and the sign-on repository and adapted to receive from the client a request to access one or more resources, assign a session identifier to a user of the client requesting to access one or more of the resources, the session identifier associated with a user identifier for the user of the client, record the session identifier and the user identifier in the sign-on repository, and provide the user identifier and session identifier to one or more applications managing the one or more resources requested by the client;
a plurality of servers communicatively coupled with the client and the central log data repository and wherein each of the plurality of servers executes a logging agent and one or more applications managing one or more resources, wherein each logging agent records in the central log data repository accesses of the one or more resources managed by the one or more applications of the server executing the logging agent, and wherein the one or more applications of at least one server of the plurality of servers access the one or more resources requested by the client based on the request and the logging agent of the at least one server logs a record of each access of the one or more resources in the central log data repository, each record including the user identifier and the session identifier; and
an auditor system communicatively coupled with the central log data repository and each of the logging agents and adapted to read a plurality of records of said accessing of the one or more resources from the central log data repository, correlate two or more of the plurality of records of said access of the one or more resources, determine, based on the correlated two or more records and a set of rules defining prohibited activity, whether a prohibited activity is being performed by a user with more than one active session, wherein the set of rules defining prohibited activity is maintained by the auditor system and defines patterns of actions related to malicious activity and wherein determining whether a prohibited activity is being performed comprises comparing the correlated two or more records to the set of rules.
12. The system of claim 11, wherein the one or more applications further determine whether the user of the client is authorized to access the one or more resources requested by the client in a manner requested based on the user identifier and the session identifier.
13. The system of claim 11, wherein the auditor system responsive to determining that a prohibited activity is being performed, is further adapted to take corrective action.
14. The system of claim 13, wherein the auditor system is further adapted to configure each of the logging agents.
15. The system of claim 14, wherein configuring each of the logging agents comprises configuring a format of the record and an event to be logged.
16. The system of claim 11, wherein the single sign-on server is further adapted to determine, based on contents of the sign-on repository, whether a session identifier has already been assigned to the user of the client, and responsive to determining a session identifier has already been assigned to the user of the client, invalidate a previous session identifier associated with the user identifier for the user of the client and assigning a new session identifier to the user.
17. The system of claim 11, wherein the single sign-on server is further adapted to provide the user identifier and session identifier to the one or more applications managing the one or more resources by generating a redirection request, the redirection request including the session identifier and an indication of a location of the resource and send the redirection request to the client.
18. The system of claim 11, wherein each record further includes a timestamp indicating a time said accessing the one or more resources is performed.
19. The system of claim 11, wherein each record further includes an indication of a type of access requested to be performed on the one or more resources by the client.
20. The system of claim 11, wherein each record further includes an indication of the one or more resources requested by the client.
21. The system of claim 11, wherein each record further includes an indication of a result of said accessing of the one or more resources requested by the client.
22. A machine-readable memory device having stored thereon a series of instructions which, when executed by a processor, cause the processor to audit access of one or more resources by a client by:
receiving at a single sign-on server from the client a request to access one or more of the resources;
assigning with the single sign-on server a session identifier to a user of the client requesting to access one or more of the resources, the session identifier associated with a user identifier for the user of the client;
recording the session identifier and user identifier with the single sign-on server in a sign-on repository maintained by the single sign-on server;
providing the user identifier and session identifier to the client from the single sign-on server;
redirecting the client from the single sign-on server to a server of a plurality of servers other than the single sign-on server;
providing the user identifier and session identifier to one or more applications managing the one or more resources requested by the client, the one or more applications executed by the server other than the single sign-on server and wherein each of the plurality of servers further executes a logging agent and wherein each logging agent records in a central log data repository a record of each access of the one or more resources managed by the one or more applications of the server executing the logging agent, wherein the central log data repository is separate from the sign-on repository;
accessing the one or more resources requested by the client with the one or more applications based on the request;
logging a record of said accessing of the one or more resources requested by the client in the central log data repository with the logging agent of the server executing the one or more applications managing the one or more resources requested by the client, wherein the record includes the user identifier and the session identifier;
reading with an auditor system a plurality of records of said accessing of the one or more resources from the central log repository;
correlating with the auditor system two or more of the plurality of records of said accessing of the one or more resources based on the user identifier and session identifier of each of the plurality of records;
determining with the auditor system, based on the correlated two or more records and a set of rules defining prohibited activity, whether a prohibited activity is being performed by a user with more than one active session, wherein the set of rules defining prohibited activity is maintained by the auditor system and defines patterns of actions related to malicious activity and wherein determining whether a prohibited activity is being performed comprises comparing the correlated two or more records to the set of rules.
23. The machine-readable memory device of claim 22, wherein accessing the one or more resources requested by the client further comprises determining whether the user of the client is authorized to access the one or more resources requested by the client in a manner requested based on the user identifier and validity of the session identifier.
24. The machine-readable memory device of claim 22, wherein assigning the session identifier to the user of the client further comprises:
determining based on the session identifier and user identifier recorded in the sign-on repository whether a session identifier has already been assigned to the user of the client; and
responsive to determining a session identifier has already been assigned to the user of the client, invalidating a previous session identifier associated with the user identifier for the user of the client and assigning a new session identifier to the user.
25. The machine-readable memory device of claim 24, wherein providing the user identifier and session identifier to the one or more applications managing the one or more resources comprises:
generating a redirection request with the single sign-on server, the redirection request including the session identifier and an indication of a location of the resource; and
sending the redirection request from the single sign-on server to the client.
26. The machine-readable memory device of claim 22, wherein each record further includes a timestamp indicating a time said accessing the one or more resources is performed.
27. The machine-readable memory device of claim 26, wherein each record further includes an indication of a type of access requested to be performed on the one or more resources by the client.
28. The machine-readable memory device of claim 27, wherein each record further includes an indication of the one or more resources requested by the client.
29. The machine-readable memory device of claim 28, wherein each record further includes an indication of a result of said accessing of the one or more resources requested by the client.
30. The machine-readable memory device of claim 29, further comprising:
responsive to determining that a prohibited activity is being performed, taking corrective action with the auditor system.
31. The machine-readable memory device of claim 22, further comprising authenticating the user of the client prior to assigning the sign-on identifier to the user of the client.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method of providing assembly instructions, comprising:
presenting by a computer output device figure data of a component to be assembled onto an object;
presenting by said computer output device an instruction for the assembly of said component onto said object;
capturing by an imager an image of said component assembled on said object;
evaluating by a processor a compliance with said instruction of said image of said component assembled on said object; and
presenting by said computer output device a result of said evaluation.
2. The method as in claim 1, wherein said computer output device is at least one of a list comprising a computer screen, a video screen and a speaker.
3. The method as in claim 1, comprising
presenting a series of instructions for assembling said object,
capturing a series of images of said assembly of said object while said assembly is in progress, and
presenting, while said assembly is in progress, a discrepancy between a first of said series of instructions and figure data of said object captured in a first image of said series of images.
4. The method as in claim 1, wherein said presenting said result of said evaluation comprises presenting an indication of a discrepancy between said instruction and said image of said component assembled on said object.
5. The method as in claim 1, comprising modifying by said processor a level of tolerance for a discrepancy between said instruction and said image of said component assembled on said object.
6. A method of presenting by an output device, instructions for assembly of an object, comprising:
presenting with said output device figure data of a plurality of components;
presenting with said output device a first instruction, said first instruction for an assembly of a first of said components onto an object;
capturing by an imager an image of said object, said image including said first of said components assembled on said object;
determining by a processor a compliance with said first instruction of said object captured in said image;
presenting with said output device a second instruction, said second instruction for assembly of a second of said components onto said object;
wherein a parameter of said second instruction is modified based on a parameter of said compliance, and
wherein said parameter of said second instruction is selected from the group consisting of a complexity of said second instruction and a period of time for assembling said second of said components onto said object; and
wherein said parameter of said compliance is selected from the group consisting of a period of time required to assemble said first of said components on said object, a complexity of said first instruction and a level of tolerance of a said compliance with said first instruction.
7. The method as in claim 6, wherein said output device is at least one of a group consisting: computer screen, video screen and speaker.
8. The method as in claim 6, comprising presenting figure data about the object to be assembled.
9. The method as in claim 6, wherein said components comprise blocks.
10. A system for providing assembly instructions, comprising:
a computer output device adapted to present figure data of a component to be assembled onto an object and instruction for the assembly of said component onto said object;
an imager adapted to capture an image of said component assembled on said object; and
a processor adapted to evaluate a compliance with said instruction of said image of said component assembled on said object;
wherein said output device is further adapted to present a result of said evaluation.
11. The system as in claim 10, wherein said computer output device is at least one of a group consisting: a computer screen, a video screen and a speaker.
12. The system according to claim 10 further comprising a data storage unit.
13. The system as in claim 10, wherein said processor is adapted to adjust a level of tolerance for a discrepancy between said instruction and said image of said component assembled on said object.

1461177877-76147ca1-6c47-47e0-b556-e74ce8b9d664

1. A system for illuminating at least one target in a scene, the system comprising:
an input for receiving an image acquired on said scene, said image comprising said target;
an illumination device having an illumination field and adapted to illuminate a selected portion only of said illumination field according to an illumination figure for selectively illuminating said target in said illumination field; and
an illumination controller for determining said illumination figure from said image such that said portion adaptively matches at least a position of said target in said image, said illumination figure being determined according to a known registration between said image and said illumination field.
2. The system as claimed in claim 1, wherein said input is to receive said image updated in time and wherein said illumination figure is updated in time as a function of said image such that said illumination figure tracks said target as it moves in the scene.
3. The system as claimed in claim 1, further comprising a sensing device for acquiring said image.
4. The system as claimed in claim 3, wherein said sensing device is an infrared sensor.
5. The system as claimed in claim 3, wherein said sensing device operates in at least one of the x-ray spectrum, the ultra-violet spectrum, the near-infrared spectrum, the mid-infrared spectrum, the long-infrared spectrum and the terahertz spectrum.
6. The system as claimed in claim 1, further comprising: an image processor for processing said image to extract a shape and said position of said target in said image.
7. The system as claimed in claim 1, wherein said illumination device comprises an array of light sources, said light sources individually corresponding to points in said illumination figure.
8. The system as claimed in claim 3,
wherein said sensing device comprises a sensor array defining an array of sensor pixels, said sensor pixels individually corresponding to points in said image; and
wherein said registration comprises a correspondence between points in said image and points in said illumination figure.
9. The system as claimed in claim 1, wherein said illumination device comprises a single light source and a spatial light modulator array coupled thereto to define an array of illumination zones individually corresponding to points in said illumination figure.
10. The system as claimed in claim 1, wherein said illumination device comprises at least one of a laser diode, a light emitting diode and a light bulb.
11. A system comprising a plurality of sub-systems as the system claimed in claim 1, wherein the sub-systems are positioned at different view points relative to the same one of said scene.
12. A method for illuminating at least one target in a scene, the method comprising:
acquiring an image of said scene, said image comprising said target;
determining, from said image, an illumination figure defined on an illumination field, such that said illumination figure adaptively matches at least a position of said target in said image, said illumination figure being determined according to a known registration between said image and said illumination field; and
illuminating a selected portion only of said illumination field according to said illumination figure for selectively illuminating said target in said illumination field.
13. The method as claimed in claim 12, wherein said acquiring comprises updating said image in time and wherein said determining comprises updating said illumination figure in time such that said illumination figure tracks said target as it moves in the scene.
14. The method as claimed in claim 12, further comprising: processing said image to extract a shape and said position of said target in said image.
15. The method as claimed in claim 12, wherein said illuminating a portion comprises: activating part of an array of light sources so that said target is selectively illuminated in said illumination field, said light sources individually corresponding to points in said illumination figure.
16. The method as claimed in claim 12, wherein said acquiring an image comprises acquiring an infrared radiation of said scene.
17. The method as claimed in claim 12, wherein said illuminating a portion only of said illumination field comprises emitting a light in the visible spectrum.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

What is claimed is:

1. A communication system comprising:
a first customer communication device and at least one second customer communication device;
a communication address service provider configured for providing an indexed array of a unique caller identification associated with the first customer communication device and the unique caller identification associated with at least one return communication address of the at least one second customer communication device; and
a vendor configured for sending a message to the at least one second customer communication device at the at least one return communication address in response to a telephone call to the vendor initiated by the first customer communication device.
2. The system of claim 1 wherein the system includes a caller identification service provider configured for provider caller identification of a consumer telephoning the vendor.
3. The system of claim 2 wherein the communication address service provider comprises the caller identification service provider.
4. The system of claim 1 wherein the message comprises at least one of the following formatted messages:
uniform resource locator of a web site;
a text message;
a hypertext markup language page;
a vCard; and
a vCalendar.
5. The system of claim 1 wherein the return communication address of the at least one second communication device comprises at least one of an uniform resource locator posting;
an electronic mail address;
and a short message service address.
6. The system of claim 1 wherein the vendor is configured for sending the message during the phone call between the first communication device and the vendor.
7. The system of claim 1 wherein the first customer communication device and the at least one second communication device comprise at least one of:
a telecommunications module;
a wireless transceiver;
an user interface;
a web browser;
a controller;
a memory;
an application software;
a caller identification function;
a cell phone;
a personal digital assistant;
a notebook computer; and
a desktop computer.
8. The system of claim 1 wherein the vendor comprises at least one of:
a telecommunications system;
a vendor response monitor;
a content database server; and
a caller identification function.
9. The system of claim 8 wherein the vendor response monitor comprises:
a return address selector configured for selecting a return communication address including at least one of an electronic mail address, a short message service address, and a uniform resource locator address;
a content selector database configured for selecting a formatted message comprising at least one of an uniform resource locator site address, a text message, a hypertext markup language page, an electronic business card, and a electronic calendaring file.
10. A computer-readable medium having computer-executable instructions for performing a method of communicating with a customer, the method comprising:
capturing a caller identification associated with a customer during a telephone call between the customer and a vendor;
selecting a content for transmission from the vendor to the customer;
obtaining a return communication address for a communication medium, from an array of return communication addresses associated with the caller identification, with the return communication address being different than a telephone number associated with the caller identification; and
sending the content from the vendor to the customer in a target message at the return communication address.
11. The medium of claim 10 wherein selecting a content includes:
selecting a type of the content that is based on a formatted message of the obtained return communication address.
12. The medium of claim 10 wherein selecting content includes:
selecting a formatted message of the obtained return communication address that is based on a type of the at least one content.
13. The medium of claim 10 wherein the sending the content comprises:
sending the content during the telephone call between the vendor and the customer.
14. The medium of claim 10 wherein obtaining a return communication address comprises:
providing the array to include, associated with a unique caller identification, the following types of return communication addresses: an uniform resource locator posting; an electronic mail address; and a short message service address.
15. The medium of claim 10 wherein selecting the content comprises:
selecting at least one of the following formatted messages:
uniform resource locator of a web site;
a text message;
a hypertext markup language page;
a vCard;
and a vCalendar.
16. The medium of claim 10 wherein selecting the content comprises:
selecting content based on consumer preferences from a customer relationship management database.
17. A method of communication with a customer, the method comprising:
receiving a consumer-initiated telephone call and capturing a caller identification of the consumer during the telephone call; and
sending, in response to the consumer-initiated telephone call, a target message from the vendor to the consumer using a return communication address associated with the caller identification, with the return communication address being different than a caller identification telephone number through which the consumer-initiated telephone call was made, and with the target message including content responsive to the telephone call.
18. The method of claim 17 wherein sending the target message is carried out during the telephone call.
19. A responsive vendor-customer communication system comprising:
means for uniquely identifying a customer through a first communication between a vendor and the customer;
means for sending a message to the customer during the first communication using a second communication medium independent of a medium used for carrying out the first communication;
means for obtaining an address for sending the message through the second communication medium based on the means for uniquely identifying the customer.
20. The system of claim 19 wherein the means for sending the message comprises:
means for sending the message during the first communication.