摘要:
A method of transmitting digital data between a base unit and a handset of a cordless telephone includes the step of transmitting a frame including a speech data portion, and a non-speech data portion. In one particular example, the size of the speech data portion and the size of the non-speech data portion are variable. In an alternative embodiment, a cordless telephone includes a base unit, including a codec adapted to convert analog speech data from a far end party to digital samples, a variable encoder adapted to encode the digital samples, and a transceiver adapted to transmit and receive encoded digital samples. The cordless telephone also includes a handset, including a transceiver adapted to transmit and receive encoded digital samples, a controller adapted to act on non-speech data, and a transducer adapted to be responsive to speech data. According to this embodiment, the variable encoder is adapted to encode a speech data portion of a frame based upon a non-speech data portion of the frame. In another alternative embodiment, a frame structure for digital RF communications between a base unit and a handset of a cordless telephone includes a speech data portion, and a non-speech data portion. In one particular example a size of the speech data portion and a size of the non-speech data portion are variable.
摘要:
A method and apparatus to perform a real-time drift correction of a remote handset's local oscillator in a digital cordless telephone. The remote handset begins in a standby (sniff) mode. The remote handset periodically wakes from a sleep mode and goes into a normal link verification mode. Once in the link verification mode, the remote handset enters a time division duplexing (TDD) mode and attempts to establish a link with a base unit based on the timing of the TDD data frame. After the remote handset establishes a link with the base unit, the remote handset requests a security word from the base unit. Upon receiving the requested security word, the remote handset determines if the requested security word matches a security word of the remote handset. The remote handset implements a software frequency adjustment of its local oscillator. Once per frame, the remote handset enters a timing recovery state where the current state of the frame is compared with a previous state. When the cumulative timing slip is greater than a designated threshold, a frequency adjustment is made. During this exchange of commands between the remote handset and base unit, the remote handset continuously adjusts its local oscillator to achieve frequency alignment within, e.g., 1 part per million (ppm). Alternatively, frequency alignment may be achieved to a specified value.
摘要:
A system and method is provided for monitoring a plurality of audio sources and switching from one to another of the audio sources in accordance with a stored program. An audio output device receives a signal from each of the portable electronic devices and selectively switches the contents of its output according to at least one preprogrammed user preference. The audio output device also automatically communicates with transceiver modules connected to local information systems, for example within a vehicle, office or shopping center. Based on programs stored in a storage device connected to the headset, the local information sources may be monitored and selected to interrupt other audio sources received by the headset when desired.
摘要:
A wireless piconet network device includes a GPS receiver to determine and provide earth coordinates to a gatekeeper of a wireless network so as to provide a level of security to wireless networks which requires accessing wireless devices to be within predefined boundary coordinates. The automatic restriction of access to a wireless network (e.g., a wireless local area network (LAN) such as a piconet network) by requiring a wireless network device to provide earth coordinates (e.g., GPS location information) as part of an establishment or maintenance of a connection to a wireless network, independent of a range of communication of any device in the wireless network. A wireless piconet network device outside of predetermined earth coordinates of a secured area (e.g., a building, a room in a building, a desk in a room in a building, etc.) may be denied access to resources on the wireless network, and/or required to provide additional authorization information so as to confirm authorized secured status of the entering wireless device.
摘要:
An application usage time limiter monitors certain pre-configured application programs when opened or otherwise executed on a computer (e.g. a PC). The application usage time limiter is itself a program running either as a front end to various selected programs for monitoring, or as a separate program running in a time-sharing operating system environment. Pre-configurable options in a usage limiter configuration file or other memory area are set to limit real time ranges that particular application programs on a particular computer can be started and run, and a limit to a length of time that a specific program (or category of programs-an be operated given a number of available credits for a current user. The user is given credits at a pre-configured rate per hour of usage of an application program designated in the usage limiter configuration file as being beneficial, and the user gives back (or looses) credits at a pre-configured rate per hour of usage for use of programs designated as non-beneficial. Preferably, continued usage of beneficial programs is detected, e.g., by keystrokes. Application programs selected for monitoring in the usage limiter configuration file can be identified on an application by application basis, as a specific category of applications identifiable when the particular application is started, or as being stored in a specific directory (e.g., folder in a Windows™ operating system). A credit-giving (i.e., beneficial program) must be run by a particular user to earn credits before a credit-taking (i.e., non-beneficial program) can be run by that user. Up front credits may be provided to a particular user in a user log.
摘要:
When a plurality of cordless telephones (e.g., digital cordless telephones) are used within range of one another, base units of one or more of the digital cordless telephones may receive transmissions from others of the digital cordless telephones. Conventionally, the base unit would simply ignore information relating to that received from an unintended remote handset, i.e., a remote handset having a security code which fails to match that of the receiving base unit. However, in accordance with the principles of the present invention, information regarding the unique security code received with respect to other remote handsets (i.e., those having security codes which do not match that of the receiving base unit), are logged and used in a way which provides a unique best available channel list to each of the digital cordless telephones so that similar digital cordless telephones operating in a similar environment do not attempt selection of channels in a similar way (causing channel inclarity and/or interference). In a first embodiment, the list of best available channels is randomized based on the unique security code of the relevant digital cordless telephone. In a second embodiment, the list of best available channels is randomized only when another digital cordless telephone becomes within transmission range of the relevant digital cordless telephone. In a third embodiment, a list of best available channels is uniquely indexed for each digital cordless telephone based on a ranking of the digital cordless telephones within transmission range of one another. For instance, the highest ranking digital telephone in an environment with three digital cordless telephones attempts use of, preferably in order, the 1st, 4th, 7th, 10th, etc. channels.
摘要:
The current draw of a wireless device, e.g., a cordless telephone, is minimized for a cradled remote handset drawing power from an AC outlet. This allows a greater portion of the total current amperage provided by the AC to DC converter to be allowed to charge the battery in the remote unit, and reduces the overall maximum or peak value of the current draw of the wireless device. With an improved peak power budget, a smaller (and presumably less expensive) AC to DC adapter than otherwise necessary may be used to power the wireless device. In one aspect, sniff operations of the remote handset are disabled or otherwise suppressed while the remote handset is in the cradle of the base unit, e.g., receiving a quick charge or trickle charge to its battery. In a second aspect, sniff operations of the base unit are disabled or otherwise suppressed while the remote handset is in the cradle of the base unit. In a last aspect, the charging mode of the battery in the remote handset of a wireless device changes based on activity in the remote handset.
摘要:
A wireless piconet transceiver is mounted in a vehicle, and a complementary fixed wireless piconet transceiver is mounted in a garage, service station, police squad car, etc., for communication with the vehicle when parked adjacent thereto. The vehicle establishes a temporary piconet network with the user's home piconet. Vehicle operational statistics are tracked and maintained in a centralized vehicle computer database. This database can be manipulated to store the data desired by the vehicle owner. Via a wireless piconet connection, this database can transmitted to another piconet device such as the owner's computer. This computer system can be part of a wireless piconet, such as Bluetooth, This provides the computer with the ability to communicate with external wireless devices such as a cell phone, PDA, computer, or a cordless telephone. This invention allows for the configuration, or selection of desired vehicle data to be tracked. This configuration can take place on the owner's home computer (or laptop) and consequently transmitted to the vehicle computer using a wireless piconet protocol, e.g., the Bluetooth protocol. Additionally, this configuration can be manipulated by a direct interface to the vehicle provided by the manufacturer. Exemplary vehicle statistics which may be tracked include, but are not limited to, miles per gallon, average miles per hour, maximum MPH, miles driven per trip, driving statistics based on time of day and/or on identified driver, rotations of the engine per minute (RPM), temperature of engine, fuel gauge level, oil pressure, tires, brakes, engine coolant, wiper fluid, global positioning satellite (GPS) system, and/or even compressed voice from inside car cockpit during operation of vehicle.
摘要:
The features and settings of wireless devices, such as cellular and cordless telephones, can be configured through the use of a user friendly web page, website, e-mail menu or the like. After a user has identified a wireless device or devices to configure, she then selects the features and settings she desires. The selected settings are then transmitted to the identified wireless device or devices. In this manner, wireless devices can be remotely configured and there is no need to repeat identical steps to configure multiple devices with the same configuration.
摘要:
Confidential information is protected from unauthorized or accidental disclosure by requiring a successful comparison of near end and far end passwords prior to a facsimile transmission of the confidential information.