摘要:
A system for changing the coder-decoder utilized during a voice over Internet protocol telephone call is disclosed. The system includes two local area networks connected to each other via a wide area network. Each local area network includes a router connected to the wide area network, a switch connected to the router and a voice over Internet protocol telephone connected to the switch. The voice over Internet protocol telephones are configured to detect when voice packets are being dropped and utilize a lower bandwidth coder-decoder.
摘要:
A method and apparatus are disclosed for security in a VoIP (Voice over Internet Protocol) message. A system that incorporates teachings of the present disclosure may include, for example, an access point (104) has a transceiver (302) for coupling a VoIP terminal (102) with a communications network (110), and a processor (304). The processor is programmed to intercept (302) a VoIP (Voice over Internet Protocol) message from the VoIP terminal, interleave (306) portions of the VoIP message into two or more packet streams, encrypt (310) each packet stream, and transmit (316) each encrypted packet stream in distinct communication channels of the communication network.
摘要:
A system includes a multimedia data interface to receive data representative of one or more multimedia channels and a display interface to a display device, the display interface to provide processed multimedia data. The system further includes a security control module to receive alarm sensor data associated with one or more alarm sensors and an alarm premises display module coupled to the security control module and the display interface. The alarm premises display module includes logic to provide a premises diagram for display via the display interface, wherein the premises diagram illustrates a layout of monitored premises and logic to provide a representation of an alarm status of one or more premises locations based on the alarm sensor information.
摘要:
The present invention discloses a method and apparatus for receiving a plurality of cellular telephone signals over an RF communication system. The present invention receives at least one signal at a cellular frequency, identifies a user associated with the cellular signal, converts the signal to an RF signal, and sends the converted RF signal to the RF communication system. The call is received at wireless RF handset. A removable Subscriber Identity Module (SIM) of a cell phone docked and integrated with the present invention to route the cellular call to RF receiver. Multiple RF communication lines are managed. Various methods of notifying the intended recipient are disclosed, such as textual display and distinctive ring tones.
摘要:
A television and a method are provided. The television includes a display, a first network interface to a packet-based network, a first modular card receptacle coupled to the first network interface, and an audio receiver modular card coupled to the first modular card receptacle, the audio receiver modular card to process audio data, wherein the television is operable to display video content on the display promptly upon receipt of a user request.
摘要:
In the present invention, one or more switches (100) can be interconnected to one or more Public Safety Answering Points (202, 302). Each switch has a switching element (102) for interconnecting a first PSAP to one among a plurality of central offices (210, 310), a memory (104) for storage, and a processor (106) for controlling operations of the switching element and the memory. The processor is programmed to detect (408) a service interruption between the first PSAP and a first central office, and cause (412) the switching element to switch the first PSAP to a second central office selected among the plurality of central offices.
摘要:
A method and system of securing electronic data. A protection feature may be included with the data to securing the user thereof. The protection feature may become active upon a triggering event to secure the data.
摘要:
A system and method is discussed for targeting a message to an intended listener over a public announcement system by selecting a single broadcast location, such as a speaker, from a plurality of broadcast locations. A typical method for locating a listener uses a method of triangulation of a wireless device located on the listener. A broadcast location is selected from distance calculations that determine which broadcast location is closest to the listener. Each broadcast location has an associated Internet Protocol (IP) address. The message is delivered to the IP address of the closest broadcast location. Voice over Internet Protocol (VoIP) technology can be used to selectively deliver the message.
摘要:
Electronic data files are broadly characterized as “messages” and a social network is constructed by analyzing one or more messages exchanged between various entities. Additionally, messages from structured and/or unstructured data stores are correlated using one or more common/related data elements from two or more messages. Further, the social network and the concepts contained in the exchanged messages (i.e. semantic network) can be visualized using a series of multi-aspect viewing tools. Finally, in conjunction with the social network and the semantic network, a message network based on the chronological relationship of the messages (event network) can be constructed to analyze and visualize how the messages relate to each other in a time-based reference model. Once visualized, the relationship of the concepts contained in the messages as well as the relationship between the entities and the timing involved in the exchange of messages can be analyzed for desired information.
摘要:
A cellular telephone docking station is provided and includes a semiconductor device that has a processor and a memory device that is coupled to the processor. An identification device is coupled to the semiconductor device and the identification device includes a docking station identification. The cellular telephone docking station also includes a cellular telephone cradle that is coupled to the identification device. Further, a computer program is embedded within the memory. The computer program includes instructions to verify that a cellular telephone identification matches the docking station identification. Additionally, the computer program includes instructions to transfer a cellular telephone service associated with the cellular telephone to the docking station. The computer program also includes instructions to disable the cellular telephone.