摘要:
A multi-tier ASP delivery system. The system can include a host computing device configured to communicate both with a computer communications network and with a plurality of wireless devices in a personal area network (PAN). In particular, a short-range radio communications system can be provided with which wireless communications in the PAN can be established and maintained. A list of ASP services further can be provided which indicates those ASP services which can be accessed by the wireless devices in the PAN. The ASP services in the list can reside locally in the host computing device and remotely in ASP servers in the computer communications network.
摘要:
A method for delivering electronic services in a personal area network (PAN) can include providing a kiosk in a publicly traversable area. The kiosk can be configured to deliver electronic services over short-range radio communications links to wireless devices in a personal area network (PAN). The kiosk also can be configured to communicate over an existing physical communications link medium. A PAN can be established in the publicly traversable area. Electronic services can be selectably retrieved through the existing physical communications link medium into the kiosk. Finally, the retrieved selected electronic services can be delivered to wireless devices in the PAN over the short-range radio communications link. Notably, the step of establishing a PAN in the publicly traversable area can include establishing a BLUETOOTH-based PAN with wireless devices in the publicly traversable area. In addition, the step of providing a kiosk first can include retrofitting an existing kiosk both with a short-range radio frequency communications system, and with a host computing device for selectively retrieving electronic services over the existing physical communications link medium, and for delivering selected electronic services to the wireless devices in the PAN. Second, the retrofitted kiosk can be activated in the publicly traversable area.
摘要:
Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement.
摘要:
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.
摘要:
A security system and methodology are provided employing a process that determines whether to use an image and/or other inputs received from at least one remote input node. In one illustrative embodiment, the invention comprises a system and method for using image input in conjunction with wireless transmission to increase personal safety.
摘要:
A method of transferring data includes reception of a message from a first mobile device operated by a user, storage of the message according to a location of the first mobile device, reception of an indication that a second mobile device operated by a second user is located proximate to the location, and transmission of the message to the second mobile device.
摘要:
Systems and methods are provided to facilitate a distribution of information. According to one embodiment, vehicle control information is determined, the vehicle control information being dependent on time in formation, operator information, and/or vehicle information. For example, an intersection control signal may be determined. The vehicle control information is then transmitted to an automobile device, which in turn arranges for the vehicle control information to be provided to an operator. For example, a graphical representation of an intersection control signal may be displayed on an automobile's windshield.
摘要:
A simplified TV viewer response system coupled to a telephone system enables a viewer/subscriber to respond to television displays by dialing a special code less than six digits. The code is routed to an enhanced services server. The server captures the dial string including the caller ID, checks the caller ID against a subscriber/viewer profile and maps the caller ID to the cable company providing service to the viewer/subscriber. The server delivers the response to the cable television company which processes the response according to the selected items or choices in the TV screen. Several special dialing codes of limited digits expedite viewer/subscriber selections. Each code includes a special character to route the dialing string to the server. The system provides sound recognition of viewer/subscriber selections.
摘要:
A multi-media search and indexing system for automatic selection of scenes or sounds recorded in media for replay in other context by analyzing the media for a set of frequency ranges of interest for replay. The media is analyzed to select desired frequency ranges of interest within the media, the selected frequency ranges being indicative of a scene or sound of interest. The granularity or length of the selected frequency ranges is selected for analysis. A number of analysis intervals are determined in the selected frequency ranges. The media is filtered for the selected frequency ranges and the audio level is measured for each interval. An audio clip level is established for each frequency range as indicative of a scene or sound of interest. The interval frequency range and audio level are recorded for subsequent replay.
摘要:
Secure communication may be conducted between two or more parties over a network, e.g the Internet without prior security arrangements among the parties or agreed to encryption/decryption software. A sending party is connected to a data network through a computer and has access to a communications network, e.g. a public switched telephone network. The sender prepares a file designated, e.g. “X” containing confidential information for secure transmission over the Internet or the like to one or more receivers. In one embodiment, the sender downloads encryption/decryption or “crypto” software stored at a location on the Internet e.g. location “U” in a Uniform Resource Locator (URL). The “crypto” software is written in executable code or an interpretive language such as JAVA. The sender selects a key “K” and encrypts the plain text file “X” into cipher text. At some point the communication network is accessed and the receiver(s) is notified of the URL U where the “crypto” software is located and the key “K” for decrypting the file “X”. Afterwards, the receiver(s) accesses the URL U using his computer and a web browser. The crypto software is pointed to in Hyper Text Mark Up Language (HTML) and displayed on the receiver screen(s). The HTML page requests the “Key” which the receiver enters. The file “X” is downloaded and decrypted using the key “K” and displayed at the receiver screen(s).