摘要:
A dispute resolution system for requesting a service provider to provide services so that the service provider can demonstrate to a service intermediary that a service consumer requested services. A service consumer that wants to start requesting services of the service provider registers with the service intermediary an end code of a sequence of code generated using a one-way function. The service intermediary provides the end code to the service provider. The service consumer can then using codes of the sequence requests the service provider to provide services. When the service provider receives a request, it verifies that the code of the request can be used to derive the end code. If the verification is successful, then the service provider can provide the verified code to the service intermediary as non-repudiatable evidence of the services requested by the service consumer.
摘要:
A speed reading system includes a plurality of printed sheets, each sheet having a pair of vertically extending scan bars and a plurality of printed lines of indicia extending perpendicular to the scan bars. Selected printed lines of indicia have a plurality of grouped scan words therein with each scan word being in a different font and larger type than the non-scanned words and each group of scan words being positioned with the first scanned word in the group in one line being adjacent to the vertically extending scan bars. A plurality of scan line indicators are located adjacent and between the scan bars with one scan line indicator being adjacent each scan line having at least one scan word therein with each scan line indicator being indicative of a line having scan words therein.
摘要:
A challenge based authentication mechanism that does not require that the authenticating computing entities be aware of the secret data used for the initial authentication. An authenticator computing entity is to authenticate to the authenticatee computing entity. First, the authenticatee computing entity acquires a challenge from a supplemental authenticatee computing entity. The authenticatee computing entity provides the challenge to the authenticator computing entity, which has a supplemental authenticator computing entity solve the challenge. The authenticator computing entity sends the answer to the authenticatee computing entity, which uses the answer to authenticate the authenticator computing entity.
摘要:
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and system allow extending the range of topologies possible with the H.323 conferencing standards while overcoming T.120 negotiating constraints. Security in such conferences may be based on a trusted node system or on more complex security procedures. Furthermore, the taught conference topologies fully utilize the T.120 standards while also permitting the reach of the conferences to the extent enabled by the H.323 standards by implementing additional modules to manage the setting up and tearing down of one or more conference connections. In addition, the method and system allow for dynamically adjusting conference connections to improve bandwidth usage and utilize H.323 support for gatekeepers.
摘要:
An arrangement for exposing self-describing device-hosted services on a client device to a host application or processes over MTP (Media Transfer Protocol) is provided by which an MTP extension comprising new MTP commands enables the device-hosted services to be backwards and forward compatible with existing MTP implementations. The new MTP commands in the extension enable discovery by the host of device-hosted services provided by a connected client device. In an illustrative example, the device-hosted services include storage services, functional device services, and information services. These device-hosted services advantageously enable richer communication between the host and client device. A set of methods is further provided for taking any such device-hosted service present on a device and exposing the functionality, for example, to web-based client applications, as well as other thin-client solutions, through utilization of a scriptable or other programming environment.
摘要:
A secure electronic transfer mechanism that does not require that the computing entities that are parties to the transaction be aware of the secret data used to secure the transfer. Instead, supplemental computing entities that do have access to such secret data are enlisted to assist in performing challenge-based authentication and authorization.
摘要:
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and system allow extending the range of topologies possible with the H.323 conferencing standards while overcoming T.120 negotiating constraints. Security in such conferences may be based on a trusted node system or on more complex security procedures. Furthermore, the taught conference topologies fully utilize the T.120 standards while also permitting the reach of the conferences to the extent enabled by the H.323 standards by implementing additional modules to manage the setting up and tearing down of one or more conference connections. In addition, the method and system allow for dynamically adjusting conference connections to improve bandwidth usage and utilize H.323 support for gatekeepers.
摘要:
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and system allow extending the range of topologies possible with the H.323 conferencing standards while overcoming T.120 negotiating constraints. Security in such conferences may be based on a trusted node system or on more complex security procedures. Furthermore, the taught conference topologies fully utilize the T.120 standards while also permitting the reach of the conferences to the extent enabled by the H.323 standards by implementing additional modules to manage the setting up and tearing down of one or more conference connections. In addition, the method and system allow for dynamically adjusting conference connections to improve bandwidth usage and utilize H.323 support for gatekeepers.
摘要:
A speed reading system includes a plurality of printed sheets, each sheet having a pair of vertically extending scan bars and a plurality of printed lines of indicia extending perpendicular to the scan bars. Selected printed lines of indicia have a plurality of grouped scan words therein, each group forming a single thought, with each scan word being in a different font and larger type than the non-scanned words and each group of scan words being positioned with the first scanned word in the group in one line being adjacent to the vertically extending scan bars. A plurality of scan line indicators are located adjacent and between the scan bars with one scan line indicator being adjacent each scan line having at least one scan word therein.
摘要:
A method and system for setting up and managing secure data/audio/video conferences with a wide range of topologies is described. The disclosed method and system allow extending the range of topologies possible with the H.323 conferencing standards while overcoming T.120 negotiating constraints. Security in such conferences may be based on a trusted node system or on more complex security procedures. Furthermore, the taught conference topologies fully utilize the T.120 standards while also permitting the reach of the conferences to the extent enabled by the H.323 standards by implementing additional modules to manage the setting up and tearing down of one or more conference connections. In addition, the method and system allow for dynamically adjusting conference connections to improve bandwidth usage and utilize H.323 support for gatekeepers.