摘要:
A clip is provided that can be used for ligating tissue, such as vessels, other tubular ducts, and the like. The clip has opposed first and second leg members having proximal and distal ends. The proximal end of each leg member is connected by an apex having a notch formed therein. Moreover, each leg member has an inner tissue-contacting surface and an outer compression-receiving surface, both of which include features to provide a more secure ligation of the vessel or duct. A method of ligating vessels is also provided.
摘要:
A hybrid network (100) includes a plurality of network elements (102, 106, 110, 114) that are coupled together by communication links (116, 118, 120, 122, 124). The network elements operate on different communications protocols. A loop back test message traverses a path (140) across network elements to test the integrity and quality of the path. Each network element that receives the loop back message modifies the message in a predetermined manner. The originator of the message verifies that the message was modified in an appropriate manner and in an appropriate time frame to determine integrity and quality.
摘要:
A method and apparatus for controlling administration of Automatic Call Distributor (ACD) queues of an ACD or network of ACDs by a caller, and of communicating data to an ACD Agent. The caller receives information concerning the status of queues in one or a plurality of ACDs. If the caller wishes to communicate with a particular Agent, wait time for that Agent is provided to the caller. The caller can select a particular Agent, and will be connected when that Agent becomes available subject to other restrictions of the ACD queue. The caller can prepare information for transmission to an answering Agent while the caller waits. Advantageously, the caller can control which Agent or which sub-group of Agents should respond to his/her call, taking into account the different waiting times associated with a particular Agent or the first available Agent when the caller reaches the top of the queue.
摘要:
The present system for the secure execution of credit based point of sale purchases uses a credit card that is devoid of any human readable customer account information on the face of the credit card and that encodes all the relevant account information on read only media built into the credit card. This encoded information can be encrypted or protected is some manner to prevent its retrieval by an unauthorized user. In addition, the present system makes use of a point of sale terminal to execute the transaction. In the transaction, the point of sale terminal scans the credit card to obtain the account information encoded therein and the user then inputs a personal identification number PIN to proceed to the next step of the charge process. The PIN number can be used as the cryptokey if the account information is encrypted on the card, or may simply represent a first level of user authentication. In either case, the account information and user authentication information is transmitted to a remotely located credit authorizing agency via telephone lines. Neither the credit card account number nor the type of card (VISA, MASTERCARD), nor the PIN number is displayed to the clerk on the point of sale terminal. If the credit card number and PIN number transmitted to the remotely located credit authorizing agency match the customer data stored at the remotely located credit authorizing agency, the point of sale terminal displays a copy of the user's signature (or photograph) for comparison by the clerk with the user's written authorization of the purchase (and/or physical appearance).
摘要:
The system for direct suppressed ringing access of a subscriber line enables the service provider to access subscriber lines from any location, as long as the incoming call is identified and authenticated as a suppressed ringing access call. The central office switch can maintain a list of predefined line numbers that are used by an authorized service provider to perform the suppressed ringing access function. Thus, a call origination on one of these lines is automatically validated as a suppressed ringing connection call. Alternatively, the suppressed ringing connection is requested by the inclusion of a predefined code in the dial string and the central office switch automatically authenticates the identity of the service provider. Manual authorization on a per call basis is available, where the service provider dials the number of a predefined access line, which connects the service provider to a suppressed ringing access apparatus that authenticates the identity of the service provider and their authority to initiate a suppressed ringing access connection to the selected subscriber line. Once the service provider authentication is accomplished, the suppressed ringing access apparatus then forwards the incoming call to the identified subscriber line via a suppressed ringing connection.
摘要:
A personnel carrying vehicle comprises a self propelled, steerable body, a telescoping mast attached to and extending upwardly from the body, and a personnel compartment attached to the mast. Two control handles are mounted within the personnel compartment, with one handle including a rocker mechanism mounted therein for pivotal movement within a generally horizontal plane to control steering and the other handle being rotated to controlling traction. Sensors ensure that the operator's hands are on both control handles and both feet are properly positioned on a floor of the operator's compartment before the vehicle can be moved or the platform raised; this ensures a four point stance, providing for operator stability and that the operator's hands and feet are within the operator's compartment anytime the vehicle is being moved or during lifting or lowering operations.
摘要:
A multi-task capable work assist vehicle is designed for transporting an operator and items to be handled by the operator and for elevating the operator with such items supported upon a load tray elevated with the operator. Preferably the load tray is mounted for positioning along a telescoping mast which supports and elevates the operator. A load deck or load platform is provided on a body of the vehicle in addition to the load tray so that items such as packages, tools, parts, merchandise and the like can be carried by the vehicle. Load shelves may also be provided adjacent the load deck to add flexibility and capacity to the load carrying capability of the vehicle. Uses of the vehicle include order picking, in-house service maintenance, stock management, cargo delivery and the like. It is designed to be compact in size and highly maneuverable for use in narrow storage aisles and tight quarters.
摘要:
A service provider accesses the customer premises equipment of an end user via a broad based data network such as the Internet. Security precautions are described for insuring that alias users cannot access the customer premises equipment. Advantageously, a service provider may provide service over a very wide area without incurring excessive telecommunications services charges. Advantageously, many service providers can readily access the customer premises equipment of a single end user.
摘要:
Apparatus for switching full-rate (e.g., 64 kilobit per second) signals and composite signals comprising a plurality of sub-rate signals (e.g., 32 kilobit per second sub-rate signal). The apparatus includes a unit for compressing selected ones of a plurality of full rate signals into a smaller plurality of full rate single and composite signals, and apparatus for expanding composite signals into full rate signals. Advantageously, during periods of heavy load, the switching network fabric of a switching system can carry more calls, and more traffic can be carried between switches equipped for sub-rate switching.
摘要:
An arrangement for inhibiting the completion on defrauding calls. Calls to certain area codes are sometimes not subject to the kinds of regulations characteristic of U.S. based area codes. The result is that callers are charged an exorbitant fee (frequently several dollars per minute) without realizing that they are incurring such charges. In accordance with applicant's invention, a data base maintains a record of suspected telephone numbers and calls to the suspected area codes are checked to see if the call is to one of the suspected numbers. If so, the caller is warned and can disconnect before the call is completed. Advantageously, possibly for the payment of the fee, callers are saved from making calls with exorbitant charges.