摘要:
An exemplary method for configuring a device to enable it to become a member of an established network comprises reading, using a portable device, a first token of a networked device, obtaining configuration data based on the first token, reading a second token of a non-networked device, establishing a communication session with the non-networked device based on the second token, and providing the configuration data to the non-networked device to enable it to become a member of the same network as the networked device.
摘要:
An accessory device is directly connected in a non-networked manner to an electronic device. The accessory device is to be used by a web application running on a computing device connected to the electronic device over a network. The accessory device has a shared context or an owned context. The shared context specifies that usage of the accessory device is shared among the web application and one or more other web applications. The owned context specifies that the usage of the accessory device is exclusive to the web application and not to any other web application.
摘要:
Communications methods and appliances are described. According to one embodiment, a communications method includes prior to deployment of an appliance, establishing a trusted association between the appliance and a certificate authority, during deployment of the appliance, associating the appliance with a communications address of a communications medium, using the certificate authority, creating a signed certificate including the communications address of the appliance, announcing the signed certificate using the appliance, after the announcing, extracting the communications address of the appliance from the signed certificate, and after the extracting, verifying the communications address of the appliance.
摘要:
A job store for a pull-based presentation output system includes a job storage storing one or more jobs from a plurality of job submission clients; and a driver storage storing one or more drivers for converting a job into a format used by a corresponding presentation output device. The job store receives a job from a job submission client, stores the job in the job storage, receives a pull command from a presentation output device when the presentation output device is one of idle and nearly finished with a current job and without receiving further input from a user of the job submission client, retrieves the job from the job storage, applies a driver for converting that job into a format used by the presentation output device sending the pull command and outputs the job to the presentation output device sending the pull command.
摘要:
An exemplary method for configuring a device to enable it to become a member of an established network comprises reading, using a portable device, a first token of a networked device, obtaining configuration data based on the first token, reading a second token of a non-networked device, establishing a communication session with the non-networked device based on the second token, and providing the configuration data to the non-networked device to enable it to become a member of the same network as the networked device.
摘要:
The invention provides a method for a sender to send a message on a tangible medium and ensure that it is privacy protected until verification that the medium has been received by the authorized recipient. The invention provides a method in which a sender creates an encrypted content message that may be decrypted using a content decryption key that is unknown to the authorized recipient. The sender creates an encrypted authentication message that may be decrypted using a recipient's key that is known to the authorized recipient but is unknown to others, except perhaps to the sender. The sender fixes the encrypted content message and the encrypted authentication message onto a tangible medium and then permits the authorized recipient to obtain the tangible medium. The authorized recipient uses the recipient's key to decrypt the encrypted authentication message and then creates a valid reply that is based upon or which uses the decrypted authentication message. The authorized recipient sends the valid reply to the sender and upon verification that the reply is valid the sender allows the authorized recipient to obtain the content decryption key. With the content decryption key, the authorized recipient is able to decrypt the encrypted content message. The invention also includes an article of manufacture for sending an encrypted message from a sender to an authorized recipient using a method, of the invention.
摘要:
A method for displaying a computer system runtime information includes the steps of displaying a plurality of runtime information items in different hyperbolic trees. The method further comprises the steps of navigating and inspecting runtime information within each individual hyperbolic tree, and navigating between semantically linked hyperbolic trees.
摘要:
A hearing aid includes an image sensing device, a sound input transducer, a sound output transducer, and a processor. The image sensing device detects an image from a selected region of a user of the hearing aid while the sound input transducer receives sound and produces an audio signal representative of the sound. The sound output transducer receives the audio signal and converts the audio signal to a sound wave that is provided to the user. The processor receives the image, analyzes the image to determine an existence of human-generated sound, and provides the audio signal from the sound input transducer to the sound output transducer when human-generated sound is detected. The audio signal is provided at a first level when human-generated sound is detected and is provided at a second level in an absence of human-generated sound.
摘要:
A system for object discovery in heterogeneous object systems includes a fixed object system having a registry. A callee object having a rendezvous name is registered in the registry of the fixed object system under the rendezvous name. The system also includes an adaptive object system having a remote procedure call protocol abstraction layer. The remote procedure call protocol abstraction layer is configured to access the registry of the fixed object system.
摘要:
An exemplary method for repurposing user identity tokens comprises receiving identification information from a user, the user having an existing user identity token and seeking to repurpose the token, obtaining a repurpose identifier associated with the user, enabling a configuration of an identification tag based on the repurpose identifier, and associating the identification tag with the identity token.