摘要:
A system includes a wireless-enabled smart card reader able to be connected concurrently to at least two devices and a mobile device able to be connected wirelessly to the smart card reader and to control connections of the smart card reader.
摘要:
Users of a computer are prevented from directly accessing certain hardware for which a driver is installed on the computer. The users are provided a limited, indirect manner to access the hardware for a specific purpose or to do a specific job. One example of such hardware is a wireless hardware communication interface. The wireless activity of the computer may be restricted so that the wireless hardware communication interface is prevented from communicating with any devices compatible with the wireless hardware communication interface other than one or more specific devices.
摘要:
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an indication from the second device that the information has been successfully inputted at the second device.
摘要:
A portable wireless communications device to be carried by a holster includes a portable housing carrying a wireless transceiver, a holster sensor, a local alert indicator, a user authentication input device, and a controller. The controller may store data and is connected to the wireless transceiver, the holster sensor, the local alert indicator, and the user authentication input device. The controller may be switchable to a pickpocket mode for activating the local alert indicator, wirelessly sending at least one remote alert message, and rendering unusable at least a portion of the stored data upon removal from the holster unless a user authentication is input before expiration of a predetermined time.
摘要:
A smart card reader receives an Answer to Reset (ATR) from a smart card and transmits the ATR over a communication link to a computing device without waiting for an ATR request from the computing device. The computing device may cache the ATR and use it for subsequent communication sessions with the smart card.
摘要:
Systems and methods for normalizing the control parameters associated with trading algorithms, providing analytic data to traders in discrete time intervals to assist in the analysis of trading performance, and providing crossing opportunities to orders that have been committed to a trading algorithm but have not yet been executed, are provided. A dashboard to allow a trading professional more effective use of multiple algorithms can be created. Parameters associated with multiple algorithms can be normalized and tuned rapidly from a single user interface. Trading performance can be reviewed in discrete time intervals and execution venues. Traders can review a performance score for a trading algorithm and select an algorithm based in part on their commission budget. Block trading opportunities can be available with a crossing engine or external ATS.
摘要:
A method of controlling reminders for an electronic calendar event record includes: generating a reminder notification at a first electronic device, the reminder notification associated with the calendar event record, providing an option at the first electronic device for taking a first action at the first electronic device and taking a second action at a second electronic device, the first action differing from the second action, generating an update command at the first electronic device for taking the second action at the second electronic device in response to receipt of selection of the option at the first electronic device, and sending the update command from the first electronic device for the second electronic device.
摘要:
A method of facilitating communications between a computer device and a smart card reader having an associated smart card, the computer device including a smart card resource manager and a smart card reader service, the smart card reader service acting as a relay for commands between the smart card resource manager and the smart card reader, the method comprising: receiving from the smart card resource manager a first command for setting a protocol for communications with the smart card; and responding, prior to receiving a reply from the smart card to the first command, to the smart card resource manager with a message indicating that the smart card has successfully received the first command.
摘要:
A method is provided for facilitating communications between a computer device and a smart card reader having an associated smart card. The computer device includes a smart card resource manager and a smart card reader service, the smart card reader service acting as a relay for commands between the smart card resource manager and the smart card reader. The method comprising the smart card reader service: (a) receiving from the smart card resource manager a first command for placing the smart card in a first state and relaying the first command to the smart card reader; (b) receiving a second command from the smart card resource manager for placing the smart card into a second state and a third command from the smart card resource manager for placing the smart card into the first state; and (c) determining if the smart card was in the first state prior to receiving the second command, and (i) if the smart card is determined to have been in the first state then forgoing relaying the second command and the third command to the smart card reader, and (ii) if the smart card is not determined to have been in the first state, then relaying the second command and the third command to the smart card reader.
摘要:
A mobile communications device for communicating with a wireless network. The device includes a processor, a communications sub-system connected to the processor for exchanging signals with the wireless network and with the processor, a user input device connected to the processor for sending user input signals to the processor in response to user inputs. A security module is associated with the processor for automatically taking a security action upon detecting a predetermined security user input through the user input device. The security action can include sending a duress message and/or wiping data stored on the device.