Abstract: The management of communications devices on an application service system is disclosed. The communications devices are associated with a user and a subscription account of a wireless service provider as identified by a wireless number. Charge data is received on the application service system from a billing system of the wireless provider. The charge data is for one of the communications devices. The charge data is then saved in a wireless device inventory database that includes one or more device records, each of which is associated with a particular one of the communications devices. The device records are also be defined by a wireless number and a charge record that includes one or more charge identifiers and corresponding charge amounts therefor. The charge data is stored in the device record. A report may be generated from the wireless device inventory database.
Abstract: An automated golf scoring system with a sensor unit wearable by the player and a data processing unit in communication therewith is disclosed. First acceleration data corresponding to a first swing motion measured with an accelerometer of the sensor unit is received. A resting state is detected with first speed data from a location positioner. The first acceleration data for the first swing motion is stored in a swing queue when the resting state is detected. A movement of the player is then detected with second speed data. A shot counter is incremented upon detecting the movement of the player. This depends on an evaluation of the first acceleration data in the swing queue having a higher magnitude than any existing acceleration data in the swing queue.
Abstract: The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured data with an initial system. The initial system transmits to an external system a token request that corresponds to the request for the secured data. A token is generated and passed to the initial system, which relays the same to the client system. The client system uses the token to access the secured data on the external system, while also retrieving the unsecured data on the initial system. The initial system thus does not have access to the secured data, while the request therefor is known.