摘要:
A method and system for providing secure communications between a first and second peer device is disclosed. The invention includes allowing the first and second peer devices to verify the authenticity of each other only while each peer device is within an established zone of privacy wherein the established zone of privacy is an area close (for example, almost touching) to the peer device. Because the authenticity of the other device is verified only while each peer device is within the established zone of privacy, users can visually confirm that there are no potential interlopers within the zone. As a result, the two peer devices can discover each other in a more secure fashion The method and system include creating a zone of privacy with the first peer device, allowing the first and second peer devices to verify the authenticity of each other only while the second peer device is within the zone of privacy, and allowing encrypted data to transfer between the first and second peer device once the authenticity of each peer device has been verified.
摘要:
A cell of a spreadsheet is automatically updated and a comment is determined to have a command associated with the update. In response to detecting the command, the command is processed.
摘要:
Data from a data source is received. A location in a spreadsheet is determined for placing at least a portion of the data from the data source based on location information for the data source.
摘要:
Differing network services can be provided to a single network agent such that a single agent can access services billed to different accounts. Different services and billed to different accounts by the network agent sending a network agent identifier to the network which identifies the agent. After an agent is identified, it sends a service qualifier that identifies a service being requested and an account to which the service should be billed or charged.
摘要:
Data from a data source is received. A location in a spreadsheet is determined for placing at least a portion of the data from the data source based on location information for the data source.
摘要:
A database system embedded in an operating system command. The system is invoked by operating system commands and uses no system resources except when performing a command. Searching is performed by binary search on a sorted file and sequential search on an unsorted file. New and changed records are appended to the unsorted file and the files are merged whenever the unsorted file becomes too long.
摘要:
Differing network services can be provided to a single network agent such that a single agent can access services billed to different accounts. Different services and billed to different accounts by the network agent sending a network agent identifier to the network which identifies the agent. After an agent is identified, it sends a service qualifier that identifies a service being requested and an account to which the service should be billed or charged.
摘要:
Aspects of the present invention describe a method of tracking an item, comprising. The items is associated with a tag and capable of responding to a query from a tag reader and tag combination. The tag reader and tag combination capable of identifying the item associated with the tag using a tag reader. In operation, a tag reader makes a request to at least one tag reader and tag combination for the identity of an item associated with a tag. The tag reader and tag combination identifies the item associated with the tag and provides the identity of the item and tag to the tag reader.
摘要:
A system for providing Internet-related services to a handheld device is described. The system includes a client module embedded in the handheld device to enable the handheld device to send a Universal Resource Locator (URL) via a communication link. The URL indicates a desired web page. The system also includes a receiver that receives the URL sent from the handheld device via the communication link. A web access module is coupled to the receiver and external Internet to access and retrieve the desired web page from a remote web server via the external Internet. A render system is coupled to the web access module to render the retrieved web page to the user of the handheld device.
摘要:
A seal for a package includes a circuit having electrical characteristics that change under mechanical deformation and an attaching material coupled to the circuit and for attaching the circuit to the package. The seal is attached to the package and processed prior to shipping to establish an untampered state for the seal. This includes identifying a circuit on the sealed package according to a seal type associated with the seal, recording one or more characteristics associated with the circuit from the seal and storing the seal type and one or more characteristics associated with the circuit from the seal for later comparison. To detect tampering to the package, the seal type and corresponding seal and circuit for the seal is identified, the characteristics associated with a circuit from the seal are determined and compared with the previous characteristics recorded when the seal was initially applied to the package. If the comparison indicates that a mechanical deformation of the seal occurred, it is possible the seal and package were tampered with during shipment or delivery.