摘要:
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.
摘要:
A simplified TV viewer response system coupled to a telephone system enables a viewer/subscriber to respond to television displays by dialing a special code less than six digits. The code is routed to an enhanced services server. The server captures the dial string including the caller ID, checks the caller ID against a subscriber/viewer profile and maps the caller ID to the cable company providing service to the viewer/subscriber. The server delivers the response to the cable television company which processes the response according to the selected items or choices in the TV screen. Several special dialing codes of limited digits expedite viewer/subscriber selections. Each code includes a special character to route the dialing string to the server. The system provides sound recognition of viewer/subscriber selections.
摘要:
Secure communication may be conducted between two or more parties over a network, e.g the Internet without prior security arrangements among the parties or agreed to encryption/decryption software. A sending party is connected to a data network through a computer and has access to a communications network, e.g. a public switched telephone network. The sender prepares a file designated, e.g. “X” containing confidential information for secure transmission over the Internet or the like to one or more receivers. In one embodiment, the sender downloads encryption/decryption or “crypto” software stored at a location on the Internet e.g. location “U” in a Uniform Resource Locator (URL). The “crypto” software is written in executable code or an interpretive language such as JAVA. The sender selects a key “K” and encrypts the plain text file “X” into cipher text. At some point the communication network is accessed and the receiver(s) is notified of the URL U where the “crypto” software is located and the key “K” for decrypting the file “X”. Afterwards, the receiver(s) accesses the URL U using his computer and a web browser. The crypto software is pointed to in Hyper Text Mark Up Language (HTML) and displayed on the receiver screen(s). The HTML page requests the “Key” which the receiver enters. The file “X” is downloaded and decrypted using the key “K” and displayed at the receiver screen(s).
摘要:
A method for providing privately viewable data in a publically viewable display comprises the steps of: generating a sequencing pattern; generating a data signal having interspersed frames of private data among frames of masking data according to the sequencing pattern; providing the data signal to the publically viewable display; and, opening and closing shutters in a set of active glasses in accordance with the sequencing pattern. In one embodiment, the sequencing pattern can correspond to alternating displays of the private data and the masking data. In an alternative embodiment, the sequencing pattern can correspond to combined left eye/right eye images of the private data. In the preferred embodiment, the masking data can be a fill pattern, for example, random data or a screen saver image. However, in another embodiment, the masking data can be a derivation of the private data. The step of opening and closing the shutters can comprise the step of responsive to sync pulses in the sequencing pattern, opening and closing the shutters. In consequence of the inventive method, a user viewing the display with the active glasses can view the private data and unauthorized viewers without the active glasses can view only the private data obscured by the masking data.
摘要:
In a search engine server, a method for searching for data in a data network comprising hyperlinked pages comprising the steps of (1) receiving an initial set of network addresses for pages in the data network; (2) receiving a non-negative integer, N, specifying a chain length; (3) receiving a set of at least one search argument comprising search criteria; and (4) performing a search wherein all pages linked to said initial set of addresses by a chain of distance less than or equal to N are examined for compliance with the search criteria, and all pages meeting such criteria are returned as successful objects of the search. According to optional embodiments, the foregoing method can be implemented as a computer readable medium with instructions for performing the above steps, as an application program, or a browser resident at an end user's computer system. It is also possible to implement as a special purpose information handling system.
摘要:
A method for searching for data in a data network comprising hyperlinked pages comprising the steps of (1) receiving an initial set of network addresses for pages in the data network; (2) receiving a non-negative integer, N, specifying a chain length; (3) receiving a set of at least one search argument comprising search criteria; and (4) performing a search wherein all pages linked to said initial set of addresses by a chain of distance less than or equal to N are examined for compliance with the search criteria, and all pages meeting such criteria are returned as successful objects of the search. According to optional embodiments, the foregoing method can be implemented as a computer readable medium with instructions for performing the above steps, as an application program, or a browser resident at an end user's computer system. It is also possible to implement as a special purpose information handling system.
摘要:
A presently disclosed radio broadcasting system for a virtual radio program broadcasting station uses a divided regional approach to broadcast digital and analog signals over a large geographic region divided into multiple overlapping but separate areas constituting small portions of the region. The small areas are served by separate transmission sources/towers supplied from a common source central to the station. The system supports reuse of allocated transmission parameters within non-neighboring small areas in the region. The station is "virtual" because its central source need not be in any of the small areas, and because it uses different transmission parameters in neighboring small areas in a manner that previously would be used by plural different stations. System transmissions include information signals sent in both analog and digital forms. The analog signals representing audibly reproducible programs, and the digital signals include instructions for controlling operations of receiver devices operating in the region. The digital signals also may include audibly reproducible program matter and instructions for controlling insertion of that matter into a program stream defined by analog transmissions. These transmissions are particularly useful for varying tuning parameters of mobile receiver devices disclosed herein to automatically and seamlessly maintain the devices tuned to the respective virtual station throughout the region, while the devices are transported across virtual boundaries between the small areas within the region. The system enables the virtual station to alternately present audible matter of general interest throughout the region and audible matter relevant exclusively to a small area within the region (e.g. advertisements specifying locations and services offered by commercial establishments within a respective area, and announcements specifying locations of public facilities such as libraries, hospitals, etc.). Transmitted digital information is retained in mass storage units associated with receiver devices and is used for adjusting tuning parameters as a device is transported across the small areas of the region, as well as for providing a portion of the program content that is played at the device during such movement.
摘要:
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.
摘要:
A method for secure entry of a user-identifier in a publicly positioned device can include establishing a private communications link between a user and the publicly positioned device; dividing the user-identifier into at least two portions; separately prompting the user for each portion of the user-identifier; prompting the user for a combination of random data and the user-identifier; and, discarding the random data from the combination. In the preferred embodiments, the publicly positioned device can have a visual interface through which the user can be visually prompted for the random data and the user-identifier. Alternatively, the publicly positioned device can have a telephone interface through which the user can be audibly prompted for the random data and the user-identifier. In the case of a visual display, the private communications link can be established by linking the publicly positioned device to active glasses having a shuttered display. The opening and closing of the shuttered display can be synchronized with the display of the prompts in the visual interface such that only the wearer of the active glasses can view the prompts. In the case of a telephone interface, an telephone operator system, for example an Interactive Voice Response system or a human operator, can provide the prompts audibly through the telephone interface.
摘要:
A data stream is transmitted to groups of individuals making separate requests for the data stream. The groups may be arranged by placing a maximum number of requesters in a group or by grouping the requesters making requests within a discrete period of time. The individual requester may be shifted from group to group or from a data store to another data store location to change the location in the data stream from which the data is sent to an individual requester or the time of transmission of the data sent from the data store.