摘要:
A method suitable for execution by a voice mail system for handling a call placed by a caller. The method comprises providing the caller with an opportunity to submit a voice segment and providing the caller with an opportunity to submit an auxiliary electronic message, such as text or files. A composite message comprising the voice segment and the auxiliary electronic message is stored in a database. The auxiliary electronic message is released to its intended recipient upon subsequent interaction between the intended recipient and the voice mail system. The ability of the caller to submit text or files increases the accuracy and flexibility with which certain types of information can be conveyed to the intended recipient. At the same time, the ability of the intended recipient to access text or files associated with individual messages allows the intended recipient to better manage missed calls when eventually accessing his or her mailbox.
摘要:
Methods, apparatus and computer-readable media for registering and retrieving contact information associated with a potential calling party. The registration method comprises receiving an originating address associated with the potential calling party, receiving contact information associated with the potential calling party and storing the originating address associated with the potential calling party in an originating address field of a record associated with the potential calling party and storing the contact information associated with the potential calling party in a contact information field of the record associated with the potential calling party. This increases the variety of contact information that can be left by the potential calling party, contributes to a greater efficiency with which the eventual called party may retrieve contact information associated with a voice mail message and also accelerates the process by which an actual calling party can leave contact information for the called party.
摘要:
A method, apparatus and computer-readable media which handles a call placed by a caller to a called party, the called party being associated with a mailbox in a message taking entity. The method comprises storing a voice mail message for the called party in the mailbox and obtaining contact information associated with the caller from a memory, the contact information associated with the caller having been stored in the memory prior to the call being placed. Ultimately, the method comprises rendering available to the called party the voice mail message in the mailbox and the contact information associated with the caller. This increases the variety of contact information that can be left by the caller, contributes to a greater efficiency with which the called party may retrieve contact information associated with a voice mail message and also accelerates the process by which the caller can leave contact information for the called party.
摘要:
A method for execution by an owner of a mailbox in a voice mail system. The method comprises using an access device to access a voicemail message contained in the mailbox and entering a command instrumental in causing the voicemail message to be forwarded over a telephone network to a conversion entity. At the conversion entity, an electronic representation of the voicemail message is created and then the electronic representation of the voicemail message is rendered accessible to the owner of the mailbox, e.g., by sending an email message to a predetermined address. In this way, electronic representations of voicemail messages in a mailbox can be accessed by the owner of the mailbox using a device of choice, not necessarily the access device used initially to enter the command. Also, this functionality is achieved while allowing the voice mail system to remain a legacy voice mail system.
摘要:
The combination key sets in mm fabrication are identified by a single color and SAE (American Standard) with a different color. Each Key has been printed in the number corresponding to the size of the logo with a different color for each color code. The Ratchet combination Key has an arrow and the numbers go in the same direction indicating the direction in which it should be used. On one side are green to tighten and on the other are red to loosen. Additionally, each key set has protective coverings that are also matched and coordinated by colors.
摘要:
A hardware-based digital random number generator is provided. In one embodiment, a processor includes a digital random number generator (DRNG) to condition entropy data provided by an entropy source, to generate a plurality of deterministic random bit (DRB) strings, and to generate a plurality of nondeterministic random bit (NRB) strings, and an execution unit coupled to the DRNG, in response to a first instruction to read a seed value, to retrieve one of the NRB strings from the DRNG and to store the NRB string in a destination register specified by the first instruction.
摘要:
A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.
摘要:
Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed.
摘要:
A hardware-based digital random number generator is provided. The digital random number generator is a randomly behaving random number generator based on a set of nondeterministic behaviors. The nondeterministic behaviors include temporal asynchrony between subunits, entropy source “extra” bits, entropy measurement, autonomous deterministic random bit generator reseeding and consumption from a shared resource.
摘要:
Techniques for communicating information over management channels are described. An apparatus may comprise a classifier module operative to classify management information for a wireless communications network as media access control security management information or media access control management information. The apparatus may further comprise a wireless transceiver to couple to the classifier module, the wireless transceiver operative to communicate the media access control security management information over an insecure management connection and the media access control management information over a secure management connection. Other embodiments are described and claimed.