Method and apparatus for setting a hearing device
    1.
    发明授权
    Method and apparatus for setting a hearing device 有权
    用于设置听力装置的方法和装置

    公开(公告)号:US08180079B2

    公开(公告)日:2012-05-15

    申请号:US12228918

    申请日:2008-08-18

    IPC分类号: H04R25/00

    CPC分类号: H04R25/70

    摘要: A method and apparatus for setting a characteristic of a source hearing device on target hearing device are provided. A transformation database is created. A source hearing device including the setting of the source hearing device are identified, the characteristic of setting is to be set on the target hearing device. The setting which, according to the transformation database on the target hearing device, results in the characteristic corresponding to the characteristic of the identified source hearing device is recalled. The target hearing device is set using the recalled setting. Settings are stored in the transformation database during their creation, which have to be set to hearing devices of different types to be set in order to grant these hearing devices the characteristic of other identified hearing with identified settings.

    摘要翻译: 提供了一种用于设置目标听力装置上的源听觉装置的特性的方法和装置。 创建转换数据库。 识别包括源听觉设备的设置的源听觉设备,将设置的特征设置在目标听力设备上。 根据目标听力装置上的变换数据库,产生与所识别的源听力装置的特征相对应的特性的设置。 目标听力设备使用召回的设置进行设置。 设置在创建过程中存储在转换数据库中,必须将它们设置为设置不同类型的听觉设备,以便将这些听力设备授予具有识别设置的其他识别听力的特征。

    Intrustion protection system utilizing layers
    2.
    发明申请
    Intrustion protection system utilizing layers 有权
    入侵防护系统利用层

    公开(公告)号:US20050257265A1

    公开(公告)日:2005-11-17

    申请号:US11081856

    申请日:2005-03-16

    IPC分类号: G06F21/00 H04L9/00 H04L29/06

    摘要: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

    摘要翻译: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象被保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。

    Method and apparatus for setting a hearing device
    3.
    发明申请
    Method and apparatus for setting a hearing device 有权
    用于设置听力装置的方法和装置

    公开(公告)号:US20090052705A1

    公开(公告)日:2009-02-26

    申请号:US12228918

    申请日:2008-08-18

    IPC分类号: H04R25/00

    CPC分类号: H04R25/70

    摘要: A method and apparatus for setting a characteristic of a source hearing device on target hearing device are provided. A transformation database is created. A source hearing device including the setting of the source hearing device are identified, the characteristic of setting is to be set on the target hearing device. The setting which, according to the transformation database on the target hearing device, results in the characteristic corresponding to the characteristic of the identified source hearing device is recalled. The target hearing device is set using the recalled setting. Settings are stored in the transformation database during their creation, which have to be set to hearing devices of different types to be set in order to grant these hearing devices the characteristic of other identified hearing with identified settings.

    摘要翻译: 提供了一种用于设置目标听力装置上的源听觉装置的特性的方法和装置。 创建转换数据库。 识别包括源听觉设备的设置的源听觉设备,将设置的特征设置在目标听力设备上。 根据目标听力装置上的变换数据库,产生与所识别的源听力装置的特征相对应的特性的设置。 目标听力设备使用召回的设置进行设置。 设置在创建过程中存储在转换数据库中,必须将其设置为设置不同类型的听觉设备,以便将这些听力设备授予具有识别设置的其他识别听力的特征。

    Intrustion protection system utilizing layers and triggers
    4.
    发明申请
    Intrustion protection system utilizing layers and triggers 有权
    使用层和触发器的入侵保护系统

    公开(公告)号:US20050257266A1

    公开(公告)日:2005-11-17

    申请号:US11082194

    申请日:2005-03-16

    IPC分类号: G06F21/00 H04L9/00 H04L29/06

    摘要: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

    摘要翻译: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象受到保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。