This disclosure provides systems, methods, and apparatuses, including computer programs encoded on computer storage media, for implementing a task management service by a first device. In one aspect of the disclosure, a method includes generating, based on a task request indicating a task to be performed, a task record and a task form. The method further includes sending the task form via a second computing device to a third computing device. The task form is configurable to be displayed on a graphical user interface (GUI) of the third computing device. The method also includes receiving, via the task form, one or more task parameters, and populating the task record based on the one or more task parameters. Other aspects and features are also claimed and described.
This disclosure provides systems, methods, and apparatuses, including computer programs encoded on computer storage media, for accessing information associated with an organization hierarchy. In one aspect of the disclosure, a method includes transmitting, from a device to a server in which multiple group models are stored, an access request to access a first group model of the multiple group models. Each group model of the multiple group models is associated with a different organization and includes multiple group data structures, multiple group type data structures, and multiple group member data structures. Each group model is associated with group hierarchy information that indicates a hierarchy associated with the multiple group data structures associated with the group model. The method further includes receiving, at the device and based on the access request, first hierarchy information associated with a first group model. Other aspects and features are also claimed and described.
This disclosure provides systems, methods, and apparatuses, including computer programs encoded on computer storage media, for accessing information associated with an organization hierarchy. In one aspect of the disclosure, a method includes transmitting, from a device to a server in which multiple group models are stored, an access request to access a first group model of the multiple group models. Each group model of the multiple group models is associated with a different organization and includes multiple group data structures, multiple group type data structures, and multiple group member data structures. Each group model is associated with group hierarchy information that indicates a hierarchy associated with the multiple group data structures associated with the group model. The method further includes receiving, at the device and based on the access request, first hierarchy information associated with a first group model. Other aspects and features are also claimed and described.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software in the nature of a mobile application for use in managing and administrating vehicle fleets Software as a service (SAAS) services featuring software for use in managing and administrating vehicle fleets; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management, inventory management, and geolocation for vehicle fleets; Software as a service (SAAS) services featuring software for use in managing and administrating auto dealer courtesy car and loaner car fleet programs and car rental services; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management and inventory management of vehicles for auto dealer courtesy car and loaner car fleets
This disclosure provides systems, methods, and apparatuses, including computer programs encoded on computer storage media, for accessing information associated with an organization hierarchy. In one aspect of the disclosure, a method includes transmitting, from a device to a server in which multiple group models are stored, an access request to access a first group model of the multiple group models. Each group model of the multiple group models is associated with a different organization and includes multiple group data structures, multiple group type data structures, and multiple group member data structures. Each group model is associated with group hierarchy information that indicates a hierarchy associated with the multiple group data structures associated with the group model. The method further includes receiving, at the device and based on the access request, first hierarchy information associated with a first group model. Other aspects and features are also claimed and described.
This disclosure provides systems, methods, and apparatuses, including computer programs encoded on computer storage media, for management of one or more organizational hierarchies. In one aspect of the disclosure, a method for managing member information associated with multiple organization hierarchies includes storing member information and a plurality of group models. Each group model of the plurality of group models includes multiple group data structures, multiple group type data structures, and multiple group member data structures. Each group model of the plurality of group models is associated with group hierarchy information that indicates a hierarchy associated with the multiple group data structures associated with the group model. The method further includes sending, to the user device and based on a received access request, first hierarchy information associated with a first group model of the plurality of group models. Other aspects and features are also claimed and described.
A quantum dot, a quantum dot composite including the quantum dot, a composition for preparing the quantum dot composite, a display panel including the quantum dot composite, and an electronic apparatus including the display panel. The quantum dot includes a semiconductor nanocrystal core including indium and phosphorus, the semiconductor nanocrystal core having an emission peak wavelength from about 600 nm to about 650 nm, or an emission peak wavelength from about 500 nm to about 550 nm, and an area of a peak from about 400° C. to about 500° C. is 0.17 times to 0.5 times relative to an area of a peak from about 200° C. to about 300° C. in a thermogravimetric analysis (TGA) graph as determined with a differential scanning calorimeter (DSC).
H01L 27/32 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including components using organic materials as the active part, or using a combination of organic materials with other materials as the active part with components specially adapted for light emission, e.g. flat-panel displays using organic light-emitting diodes
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software as a service (SAAS) services featuring software for use in managing and administrating auto dealer courtesy car and loaner car fleet programs and car rental services; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management, inventory management, and geolocation of vehicles for auto dealer courtesy car and loaner car fleets
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
G07C 9/00 - Individual registration on entry or exit
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/029 - Location-based management or tracking services
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software as a service (SAAS) services featuring software for use in managing and administrating vehicle fleets; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management, inventory management, and geolocation for vehicle fleets
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Software as a service (SAAS) services featuring software for use in managing and administrating courtesy car and loaner car fleet programs and car rental services in the field of automotive retail and automotive leasing; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management and inventory management of vehicles for courtesy car and loaner car fleets in the field of automotive retail and automotive leasing.
(2) Software as a service (SAAS) services featuring software for use in managing and administrating vehicle fleets; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management and inventory management of vehicle fleets.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software as a service (SAAS) services featuring software for use in managing and administrating auto dealer courtesy car and loaner car fleet programs and car rental services; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management and inventory management of vehicles for auto dealer courtesy car and loaner car fleets
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Software as a service (SAAS) services featuring software for use in managing and administrating auto dealer courtesy car and loaner car fleet programs and car rental services; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management, inventory management, and geolocation of vehicles for auto dealer courtesy car and loaner car fleets
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 7/04 - Identity comparison, i.e. for like or unlike values
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 7/04 - Identity comparison, i.e. for like or unlike values
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Systems, devices, and methods for controlling access to vehicles in rental, loaner, shared-use, and other vehicle fleets. Some of the present systems, devices, and methods use encrypted virtual keys that can be relayed to a vehicle computing device via a user's mobile device. Such virtual keys can be command-specific such that successful use of a virtual key results execution of a predetermined command or group of commands, and further commands require one or more additional virtual keys with the additional commands. Others of the present systems, devices, and methods provide tools: for provisioning or initial pairing of vehicle computing devices with corresponding vehicles, identifying and permitting a user to select locally available vehicles, prompting vehicle computing devices to retrieve pending commands from a server, and/or various other functions described in this disclosure.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software as a service (SAAS) services featuring software for use in managing and administrating auto dealer courtesy car and loaner car fleet programs and car rental services; Software as a service (SAAS) services featuring software for use in electronic contract signing, reservation management, inventory management, and geolocation of vehicles for auto dealer courtesy car and loaner car fleets
39 - Transport, packaging, storage and travel services
Goods & Services
Management of auto dealers' courtesy car fleets; rental car services, namely, providing courtesy and loaner car services; booking and reservation of automobiles.