-
公开(公告)号:US08180079B2
公开(公告)日:2012-05-15
申请号:US12228918
申请日:2008-08-18
IPC分类号: H04R25/00
CPC分类号: H04R25/70
摘要: A method and apparatus for setting a characteristic of a source hearing device on target hearing device are provided. A transformation database is created. A source hearing device including the setting of the source hearing device are identified, the characteristic of setting is to be set on the target hearing device. The setting which, according to the transformation database on the target hearing device, results in the characteristic corresponding to the characteristic of the identified source hearing device is recalled. The target hearing device is set using the recalled setting. Settings are stored in the transformation database during their creation, which have to be set to hearing devices of different types to be set in order to grant these hearing devices the characteristic of other identified hearing with identified settings.
摘要翻译: 提供了一种用于设置目标听力装置上的源听觉装置的特性的方法和装置。 创建转换数据库。 识别包括源听觉设备的设置的源听觉设备,将设置的特征设置在目标听力设备上。 根据目标听力装置上的变换数据库,产生与所识别的源听力装置的特征相对应的特性的设置。 目标听力设备使用召回的设置进行设置。 设置在创建过程中存储在转换数据库中,必须将它们设置为设置不同类型的听觉设备,以便将这些听力设备授予具有识别设置的其他识别听力的特征。
-
公开(公告)号:US20050257265A1
公开(公告)日:2005-11-17
申请号:US11081856
申请日:2005-03-16
申请人: Randall Cook , Dwain Kinghorn , Michael Sainsbury
发明人: Randall Cook , Dwain Kinghorn , Michael Sainsbury
CPC分类号: H04L63/1441 , G06F21/53 , G06F21/566 , H04L63/16
摘要: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.
摘要翻译: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象被保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。
-
公开(公告)号:US20090052705A1
公开(公告)日:2009-02-26
申请号:US12228918
申请日:2008-08-18
申请人: Jorg Binder , Ingo Eichinger , Claus Reinlein , Robert Ryman , Michael Sainsbury
发明人: Jorg Binder , Ingo Eichinger , Claus Reinlein , Robert Ryman , Michael Sainsbury
IPC分类号: H04R25/00
CPC分类号: H04R25/70
摘要: A method and apparatus for setting a characteristic of a source hearing device on target hearing device are provided. A transformation database is created. A source hearing device including the setting of the source hearing device are identified, the characteristic of setting is to be set on the target hearing device. The setting which, according to the transformation database on the target hearing device, results in the characteristic corresponding to the characteristic of the identified source hearing device is recalled. The target hearing device is set using the recalled setting. Settings are stored in the transformation database during their creation, which have to be set to hearing devices of different types to be set in order to grant these hearing devices the characteristic of other identified hearing with identified settings.
摘要翻译: 提供了一种用于设置目标听力装置上的源听觉装置的特性的方法和装置。 创建转换数据库。 识别包括源听觉设备的设置的源听觉设备,将设置的特征设置在目标听力设备上。 根据目标听力装置上的变换数据库,产生与所识别的源听力装置的特征相对应的特性的设置。 目标听力设备使用召回的设置进行设置。 设置在创建过程中存储在转换数据库中,必须将其设置为设置不同类型的听觉设备,以便将这些听力设备授予具有识别设置的其他识别听力的特征。
-
公开(公告)号:US20050257266A1
公开(公告)日:2005-11-17
申请号:US11082194
申请日:2005-03-16
申请人: Randall Cook , Dwain Kinghorn , Michael Sainsbury
发明人: Randall Cook , Dwain Kinghorn , Michael Sainsbury
CPC分类号: H04L63/1441 , G06F8/61 , G06F21/53 , G06F21/566 , H04L63/16
摘要: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.
摘要翻译: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象受到保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。
-
-
-