Abstract:
Disclosed are ultrasound devices and methods for use in guiding a subdermal probe during a medical procedure. A device can be utilized to guide a probe through the probe guide to a subdermal site. In addition, a device can include a detector in communication with a processor. The detector can recognize the location of a target associated with the probe. The processor can utilize the data from the detector and create an image of a virtual probe that can accurately portray the location of the actual probe on a sonogram of a subdermal area. In addition, disclosed systems can include a set of correlation factors in the processor instructions. As such, the virtual probe image can be correlated with the location of the actual probe.
Abstract:
Disclosed are ultrasound devices and methods for use in guiding a subdermal probe during a medical procedure. A device can be utilized to guide a probe through the probe guide to a subdermal site. In addition, a device can include a detector in communication with a processor. The detector can recognize the location of a target associated with the probe. The processor can utilize the data from the detector and create an image of a virtual probe that can accurately portray the location of the actual probe on a sonogram of a subdermal area. In addition, disclosed systems can include a set of correlation factors in the processor instructions. As such, the virtual probe image can be correlated with the location of the actual probe.
Abstract:
A system for performing mobile transactions includes a mobile communication device connecting to a server device via a first network. The mobile communication device includes a subscriber identification module (SIM) card slot and a virtual subscriber identification (VSIM) interface connected to the SIM card slot and it provides subscriber identity authentication to the server device via the VSIM interface. The mobile communication device further includes a mobile transaction client application for managing the communication between the mobile communication device and the server device. The mobile transaction client application manages the communication between the mobile device and the server device utilizing the Bearer Independent Protocol as defined in the European Telecommunications Standards Institute document ETSI TS 101 267 (3GPP TS 11.14).
Abstract:
A secure mobile phone-point of sale (POS) system includes a mobile phone integrated with a secure PED module. The secure PED module is integrated with the mobile phone via the phone's serial port or directly to the phone's Printed Circuit Board Assembly (PCBA). The secure PED module conforms to security standards imposed by the payment card industry. The secure mobile phone-POS system has the functionality of both the secure PED and the mobile phone and the look and feel of the mobile phone.
Abstract:
A secure electronic payment transaction system includes a Secure Transaction Module (STM) and a host device. The STM includes hardware and software components that meet the security requirements of the payment card industry and provide secure payment transactions utilizing banking cards. The host device includes a communication modem for connecting to financial institutions via a network connection. The STM connects to the host device via an interface and communicates with the financial institutions via the host device's communication modem. The STM is self-sufficient and can be connected to any host device over any interface.
Abstract:
A secure electronic payment transaction system includes a Secure Transaction Module (STM) and a host device. The STM includes hardware and software components that meet the security requirements of the payment card industry and provide secure payment transactions utilizing banking cards. The host device includes a communication modem for connecting to financial institutions via a network connection. The STM connects to the host device via an interface and communicates with the financial institutions via the host device's communication modem. The STM is self-sufficient and can be connected to any host device over any interface.
Abstract:
A secure mobile phone-point of sale (POS) system includes a mobile phone integrated with a secure PED module. The secure PED module is integrated with the mobile phone via the phone's serial port or directly to the phone's Printed Circuit Board Assembly (PCBA). The secure PED module conforms to security standards imposed by the payment card industry. The secure mobile phone-POS system has the functionality of both the secure PED and the mobile phone and the look and feel of the mobile phone.
Abstract:
A secure mobile phone-point of sale (POS) system includes a mobile phone integrated with a secure PED module. The secure PED module is integrated with the mobile phone via the phone's serial port or directly to the phone's Printed Circuit Board Assembly (PCBA). The secure PED module conforms to security standards imposed by the payment card industry. The secure mobile phone-POS system has the functionality of both the secure PED and the mobile phone and the look and feel of the mobile phone.