Abstract:
Methods and apparatus implementing a telephony terminal for connecting a telephone to a data network. In one implementation, a telephony system includes: a phone connection for connecting to a telephone; a network connection for connecting to a network; and a controller connected to said phone connection and to said network connection; wherein said controller provides a phone service for processing information for said phone connection, said controller provides a network service for processing information for said network connection, and said controller provides a network voice service for converting information to and from a network voice format.
Abstract:
The invention comprises music and information delivery systems and methods. One system comprises a portable communication device configured to receive a piece of music from an audio source and transmit the piece of music via a first communication medium to a host computer. The host computer is configured to receive the piece of music from the portable communication device and search a storage medium to identify and access the piece of music from the storage medium. The host computer is configured to transmit the piece of music via a second communication medium to one or more reception units that are configured to receive the piece of music from the host computer via the second communication medium.
Abstract:
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually simultaneously. Multiple network vantage points may include, but are not limited to, remote/branch enterprise sites, devices on an enterprise perimeter, on either side of a security perimeter, and even through the security perimeter. In one embodiment, an auditor performs reflected audits thereby extending auditing of network vulnerabilities to provide a comprehensive 360 degree audit of internal, external, and remote enterprise network sites. In one embodiment, the present invention may be implemented employing a single auditing device, and one or more audit extension devices that are configured to extend the auditing device's audit reach. The auditing device and one or more audit extension devices may communicate using an encrypted network channel through a security perimeter and/or across multiple networks.
Abstract:
A user provides an annotation, such as text or graphics, in relation to a resource available on a computer network. The annotation is automatically stored and/or retrieved without requiring separate action from the user to accomplish the storage or retrieval. An annotation interface may receive the annotation from the user. The annotation is then stored in association with the user and the network address of the resource. The user's annotation may be later retrieved and displayed to the user based on the network address of the resource. In one specific embodiment, a browser toolbar receives and displays user annotations associated with Web sites or Web pages to which the user has navigated. Preferably, the annotation interface remains available to the user throughout the time in which the resource is provided. Further controls may enable the user to make an annotation publicly available to others, and to receive annotations from others.
Abstract:
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually simultaneously. Multiple network vantage points may include, but are not limited to, remote/branch enterprise sites, devices on an enterprise perimeter, on either side of a security perimeter, and even through the security perimeter. In one embodiment, an auditor performs reflected audits thereby extending auditing of network vulnerabilities to provide a comprehensive 360 degree audit of internal, external, and remote enterprise network sites. In one embodiment, the present invention may be implemented employing a single auditing device, and one or more audit extension devices that are configured to extend the auditing device's audit reach. The auditing device and one or more audit extension devices may communicate using an encrypted network channel through a security perimeter and/or across multiple networks.
Abstract:
A method and system for graduated security in an identity management system utilize differing levels of time sensitivity, channel security and authentication security to provide a multi-dimensional approach to providing the right fit for differing identity requests. The differing levels of security can be selected by user preference, membersite request or homesite policy.
Abstract:
An apparatus, system, and method are directed towards enabling auditing of network vulnerabilities from multiple network vantage points virtually simultaneously. Multiple network vantage points may include, but are not limited to, remote/branch enterprise sites, devices on an enterprise perimeter, on either side of a security perimeter, and even through the security perimeter. In one embodiment, an auditor performs reflected audits thereby extending auditing of network vulnerabilities to provide a comprehensive 360 degree audit of internal, external, and remote enterprise network sites. In one embodiment, the present invention may be implemented employing a single auditing device, and one or more audit extension devices that are configured to extend the auditing device's audit reach. The auditing device and one or more audit extension devices may communicate using an encrypted network channel through a security perimeter and/or across multiple networks.
Abstract:
Digital camera systems and methods are described that provide a color digital camera with direct luminance detection. The luminance signals are obtained directly from a broadband image sensor channel without interpolation of RGB data. The chrominance signals are obtained from one or more additional image sensor channels comprising red and/or blue color band detection capability. The red and blue signals are directly combined with the luminance image sensor channel signals. The digital camera generates and outputs an image in YCrCb color space by directly combining outputs of the broadband, red and blue sensors.
Abstract:
Methods and apparatus implementing a telephony terminal for connecting a telephone to a data network. In one implementation, a telephony system includes: a phone connection for connecting to a telephone; a network connection for connecting to a network; and a controller connected to said phone connection and to said network connection; wherein said controller provides a phone service for processing information for said phone connection, said controller provides a network service for processing information for said network connection, and said controller provides a network voice service for converting information to and from a network voice format.
Abstract:
A mobile telephone receives, constructs and displays an image from a server over a mobile telephone network. The server determines the parameters for data transfer from the server to the mobile telephone, the capabilities of the mobile telephone, transfer task requirements, and apportions the processing between the server and the mobile telephone for each of a plurality of elements in each image, thereby to meet the task requirement, which can include being within a predetermined time for task completion, or being the fastest means for task completion. Parameters for data transfer from server to telephone include server transmission bandwidth, phone reception bandwidth, data channel bandwidth, transmission protocol, and channel accessibility. Phone capabilities include the data processing speed, the available memory, display size, and the data processing software available; Task requirements include the maximum transmission time and the minimum display resolution of the image.