摘要:
This disclosure is a method and system for the linking of digital images to RFID devices. The method includes providing at least one radio frequency identification device, each radio frequency identification device having a electronic product code; linking one or more of the electronic product codes to a digital image file; and storing the linked digital image file into a memory. The disclosure allows users to easily access only images that are linked to their RFID device. Thereby, this disclosure allows a photographer easy access to potential customers while protecting user's privacy.
摘要:
A node in the telecommunication network supports location and direction services that are especially suited for wireless subscribers. Location coordinates such as determined by the global positioning satellite system are entered by a subscriber from the location to be marked. The node stores the coordinates and compares the marked location to the current coordinates of a subscriber making a request for directions to find the first location, e.g. the subscriber's parked car. The node provides the requesting subscriber with directions for proceeding from the current location to the first location. Subscribers other than the subscriber entering the location coordinates may also access the stored location information and obtain directions to the marked location to facilitate a meeting of subscribers at a location previously marked by a subscriber.
摘要:
A method that allows subscribed content to be available to all users of an account on all devices that are capable of carrying the content. An administrator may tap into the features of the centralized data store to assign personalized usage guidelines and restrictions for all IPTV services available. This includes all devices and users within an administrator's account (including spouse, children, employees. etc.) Thus, an administrator may configure all devices under their control from a convenient centralized location without the need to locally configure each device or user profile. The administrator may enable access controls on the devices in their profiles (or subordinate profiles) from a Web-based system (that is also access controlled). The Web-based system allows the administrator to set content access controls that pertain to any or all devices (such as content blocking˜no “adult” material on any device at any time). The invention also allows the administrator to select filtering based on individual IDs (username, pins) or by device (child's cell phone, playroom DVR unit). The invention allows for content, channel, time, and other types of filtering for each ID or device.
摘要:
A remote control device is located in an environment proximate to conditions to be monitored and actions to be implemented. The remote control device is able to receive and transmit wireless text based communications. A user employing a wireless communication device that supports text based messaging can transmit a control message containing a predetermined command to the remote control device. After preferably authenticating the user, the remote control device initiates a predetermined action based on receipt of a corresponding command.
摘要:
Systems and methods are presented for providing updated VOIP terminal location information to emergency call service providers, in which RFID tags are positioned at various locations within an enterprise and coded with unique tag data. A database is provided with a mapping of RFID tag data and tag locations in the enterprise, and the VOIP phone terminals are equipped or otherwise connected with RFID tag readers. The VOIP phones read the tag data upon initiation of a 911 or other an emergency call and report the tag data to a network server that determines the VOIP phone location according to the tag data and provides the phone location to the emergency call service provider.
摘要:
A method and apparatus for improved control of intelligent network-based user features is provided. In this regard, the invention relates to a system and method useful for managing a user profile of a virtual private network system, such as an eVPN system, through manipulation of a mobile device, e.g. a mobile phone. In one form, short message service (SMS) messages can be used to facilitate such control.
摘要:
A method and apparatus for linking caller identification data to a call that originates from a virtual private network is disclosed. Steps relating to the method receiving a call, including an identifier at a mobile switching center. The identifier would identify a termination point that initiated the call. The method also includes accessing a database with call identification information in response to a trigger and linking the call with caller identification data via the identifier. The method could also include that the call is received from a cellular VPN. The system implementing the method would include a database having stored within caller identification data corresponding to an identifier, a mobile switching center configured to receive the call from a VPN and an application server configured to access the database and link the call.
摘要:
One or more video server components of an apparatus that play one or more videos at one or more mobile phones while one or more phone calls associated with the one or more mobile phones are on hold.
摘要:
One or more X10 gateway components of an apparatus in one example communicate one or more messages between one or more mobile communication devices and one or more module components.
摘要:
A method and apparatus for linking caller identification data to a call that originates from a virtual private network is disclosed. Steps relating to the method receiving a call, including an identifier at a mobile switching center. The identifier would identify a termination point that initiated the call. The method also includes accessing a database with call identification information in response to a trigger and linking the call with caller identification data via the identifier. The method could also include that the call is received from a cellular VPN. The system implementing the method would include a database having stored within caller identification data corresponding to an identifier, a mobile switching center configured to receive the call from a VPN and an application server configured to access the database and link the call.