摘要:
Broadband services are provided to customer premises, whose existing premise wiring does not have broadband capability, by disaggregating the various signals, including broadband services, supplied to the premise from a broadband communication link at the customer premise's edge, so that the existing POTS wires, within the customer premises, may function as separate channels for varied broadband and narrow band services. Intra premises broad band services are disaggregated so that POTS service responds normally to the network while internal LAN networks operate independently of the outside system network.
摘要:
A housing assembly for an ISDN multimedia capable wireless interface device having a plurality of operating capabilities. The housing assembly comprises a main housing, a cover, hinge assembly for coupling the cover to the main housing. The hinge assembly enables the cover to pivot and articulate relative to the main housing to transform the housing assembly into a plurality of mechanical configurations via sensors responsive to the pivoting and articulating of the cover provided in the housing assembly. The cover includes an illuminated keyboard having a display for selectively providing pixel-based graphics and light. The keyboard is disposed over the display when the device is operating in one of a plurality of operational modes. Each keypad of the keyboard has an image viewing surface and coherent light pipe mechanism for conducting light generated by the display to the image viewing surface the keypad. The upper rear surface of the main housing includes three unmarked softkeys which enable finger access for various device functions. The keys are software controlled and as such operate to provide a mouse, cursor control, number and text generation, video camera control and other like device features.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
A handover of a wireless communication device is performed between a first wireless band and a second wireless band when a detected feature occurs within a content stream being communicated with the wireless communication device.
摘要:
A handover of a wireless communication device is performed between a first wireless band and a second wireless band when a detected feature occurs within a content stream being communicated with the wireless communication device.
摘要:
A system is provided for tracking a free-space optical communications beam. The incoming beam is split by a beam splitter. One portion of the incoming beam is focused onto a high-speed photodetector. Another portion of the incoming beam is passed through a target pattern optical element. A resulting target pattern is formed on a two-dimensional active pixel sensor array. The alignment of the system can be adjusted based on the position of the target pattern on the sensor array.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.