摘要:
A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data.
摘要:
This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices. For example, if a person begins to download a program, the server may also download the same program on a remote backup server. This way, if the user loses this program, it can be retrieved automatically through a provided server on the Internet. If user's files are backed up by regular backup periodically, relevant data that were stored by real time backup servers can be eliminated.
摘要:
Contextual data center management utilizing a virtual environment is described. In one embodiment, there is a data center management tool for managing a physical data center from a representation of the physical data center operating in a virtual universe. The data center management tool includes a data center contextual object component configured to obtain a data center contextual object that describes operational information of the physical data center in the virtual universe. An operational change component is configured to implement at least one operational change to the representation of the physical data center in the virtual universe. The at least one operational change is implemented as a function of the data center contextual object. A management component is configured to manage the physical data center pursuant to a result obtained from implementing the at least one operational change.
摘要:
An acoustic communication device includes a computer device having an acoustic transmitter and/or an acoustic receiver. A signal processing module processes sound signals such that the transmitter and/or receiver are employed to permit acoustic communication between computer devices using sound signals.
摘要:
A system for enabling the transmission of a prepared message to multiple intended recipients, wherein the information contained in the message is substantially the same as received for all the recipients but differs in parts or portions for certain recipients comprising: a module containing the entire message which includes both the common and unique information to be transmitted and the instructions for selectively providing the information to different recipients; and scheme for sending together from the module all the parts or portions of the information to all recipients, but including means responsive to the instructions, for having selectively different parts or portions of the information received by the different recipients.
摘要:
A system and associated method for migrating from a first application to a second application where the second application is an alternative to the first application with respect to functionality. Overlaying a first graphical user interface (GUI) onto the second application where the first GUI corresponding to the first application. Sending to a display device a set of steps which if executed would invoke a feature utilizing a second GUI after the feature was invoked utilizing the first GUI. Removing the first GUI with respect to the feature and displaying the second GUI with respect to the feature after satisfying a condition. Finally, repeating the steps of sending to a display device and removing the first GUI for all features common to both the first application and the second application.
摘要:
A system and method for enabling communication concurrently over multiple access points and multiple physical media including but not limited to: cellular, network (e.g., Ethernet), broadband wireless, audio communication schemes.
摘要:
Methods and apparatus are disclosed for transmitting data, such as biometric data or Internet telephone data, in a packet network. Packets are split and interchanged prior to transmission across a packet network, such that packets that teach their destination may be processed, even in the presence of lost or delayed packets. Packets of biometric data, such as fingerprints, retinal scans or voice characteristics, or sampled voice packets are split, and optionally interchanged prior to transmission. If some packets are lost or delayed, while some of the packets reach their destination and provide sufficient data for user identification, then the user may be authenticated without requesting the retransmission of the lost or delayed data. If some packets are lost or delayed, while some packets teach their destination, then the received speech samples may be reproduced without requesting the retransmission of the lost or delayed data.
摘要:
Methods and apparatus are disclosed for transmitting data, such as biometric data or Internet telephone data, in a packet network. Packets we split and interchanged prior to transmission across a packet network, such that packets that reach their destination may be processed, even in the presence of lost or delayed packets. Packets of biometric data, such as fingerprints, retinal scans or voice characteristics, of sampled voice packets are split, and optionally interchanged prior to transmission. If some packets are lost or delayed, while some of the packets teach their destination and provide sufficient data for user identification, then the user may be authenticated without requesting the retransmission of the lost or delayed data. If some packets are lost or delayed, while some packets reach their destination, then the received speech samples may be reproduced without requesting the retransmission of the lost or delayed data.
摘要:
A system and method that provides data messages to a passive device. A passive device, for example watch, is registered together with the telephone number of a cellular telephone of a subscriber to the data message service. Since the cellular telephone periodically transmits a beacon signal, the wireless network knows its cell location. Accordingly, the system determines the cell location of the cellular telephone and establishes a communication of the subscribed data to the watch via the local cellular provider for the same cell location as that of the subscriber's cellular telephone.