摘要:
FIG. 1 is a front perspective view of a video camera showing our new design; FIG. 2 is a front elevation view thereof; FIG. 3 is a rear elevation view thereof; FIG. 4 is a left side elevation view thereof; FIG. 5 is a right side elevation view thereof, FIG. 6 is a top plan view thereof; and, FIG. 7 is a bottom plan view thereof. The even broken lines shown in the drawings are included for the purpose of illustrating portions of the video camera that form no part of the claimed design.
摘要:
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee. FIG. 1 is a front perspective view of a video camera showing our new design; FIG. 2 is a front elevation view thereof; FIG. 3 is a rear elevation view thereof; FIG. 4 is a left side elevation view thereof; FIG. 5 is a right side elevation view thereof; FIG. 6 is an enlarged top side view thereof; and, FIG. 7 is an enlarged bottom side view thereof. The broken lines and areas within them in the drawings depict portions of the video camera that form no part of the claimed design.
摘要:
The housing of a web cam includes a main housing member and a corresponding cover for accommodating a web cam module. The rear portion of the main housing member has a space and a plurality of extensions or projections along the periphery of the space, and the cover has a fixed portion and a plurality of recesses corresponding to each of the extensions or projections of the rear portion. The main housing member further has a fixing portion at the front of the main housing member for securing to a fixing portion of the cover.
摘要:
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee. FIG. 1 is a front perspective view of a video camera showing our new design; FIG. 2 is a front elevation view thereof; FIG. 3 is a rear elevation view thereof; FIG. 4 is a left side elevation view thereof; FIG. 5 is a right side elevation view thereof; FIG. 6 is a top plan view thereof; and, FIG. 7 is a bottom plan view thereof. The broken lines and areas within them in the drawings depict portions of the video camera that form no part of the claimed design.
摘要:
A notebook computer has a notebook computer housing and a web cam module secured to the notebook computer housing. The web cam module has a web cam housing, with a lens and a motor retained inside the web cam housing. The motor has a driving shaft coupled to the lens for rotating the lens to an angled position, and the motor is powered and controlled by the notebook computer to adjust the angle of the lens.
摘要:
The present invention provides a tunnel gateway device used for: receiving a domain name system (DNS) server address for an inner layer or outer layer service of a tunnel configured by an automatic control server according to a management protocol; and taking its own address as the DNS server's address and sending the address to a client, or sending the configured DNS server address to the client. The present invention also provides a method for obtaining the DNS, and the present invention implements the DNS server distribution and obtaining of the DNS without depending on the address protocol.
摘要:
Embodiments of a method for determining a mapping are illustrated. In an embodiment, the method includes receiving a log record from a tracking component that is located on a plurality of web pages. The method further includes determining a first mapping between a plurality of anchors associated with the plurality of users. The method also includes determining a second mapping between the plurality of users based on the first mapping.
摘要:
A device and method for preventing Internet Protocol version 6 (IPv6) address being fraudulently attacked are disclosed in present invention, and the method comprises: detecting a Neighbor Solicitation (NS) data packet; judging whether the source address of the data packet is an unspecified address or not; if yes, checking the IPv6 address in the Target Address field and judging whether there is a corresponding binding table item or not; otherwise, collecting the correlative information and creating a binding table item corresponding to the IPv6 address; and constituting a data flow forwarding and control strategy according to the data in the binding table item, and applying the strategy to the data flow forwarding and control. The present invention solves the problem that the address is fraudulently attacked in the IPv6 network in which addresses are assigns based on various address assignment mechanisms.
摘要:
A support for a computer peripheral device has a base, a post having a first end extending through the base and a second end that couples a computer peripheral device, and a pair of base supports. Each base support has an extension which is received within the base and which engages the first end of the post. When the post is rotated, the base supports are separated from each other to define a clamping space therebetween.
摘要:
A support mechanism for a computer peripheral device includes a housing accommodating a base within the housing, and a supporting post having a first end coupled to the base. The base has a pivoting sleeve and couples to the supporting post at a first position, and the pivoting sleeve engages with the supporting post such that the housing is rotatable to force the pivoting sleeve and the supporting post to rotate. The pivoting sleeve can move along an axial line of the housing, and the housing can be pivoted about the top of the pivoting sleeve together with the supporting post. Therefore, the housing can carry out multi-direction-movement, or so-called sphere-like movement relative to a leg coupled to the second end of the supporting post.