摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
A system and method of processing data are provided. The method may include encoding a first watermark into a data file to form first watermarked data. The data file may include audio data. The method may also include sending the first watermarked data to a remotely located user device associated with a user. The method may also include receiving a request from the user to resend the audio data. The method may further include encoding a second watermark into the data file to form second watermarked data. The method may also include sending the second watermarked data to the user device.
摘要:
A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed.
摘要:
A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy.
摘要:
A “third-party watermark” is inserted into a file or files uploaded by a client to a “storing party” such as a file backup server. The third-party watermark may contain information about the upload itself, such as time and date of the upload and the identity of the client. The third-party watermark may also contain authentication information received from the client or elsewhere that establishes that the client is in proper possession of the file, e.g., it is not a “bootlegged” copy.
摘要:
According to this invention, the system prepares user data into blocks of manageable size prior to software distribution. A block is similar in principle to memory pages in a file management system and has a predefined size, sequential ordering, and layout from which the original information can be reconstructed. The broadcast protocol is enhanced to include a block identifier to identify where the receiver performs error detection and error correction on each block. Station receiving the data maintains a list of the identity of those blocks of data that it believes have not been received properly. With each retransmission, each work station attempts to receive and recover those blocks marked on its list. Advantageously, each transmitted block is encoded using forward error correction in order to further enhance the probability of proper reception of the data. Thus, a very high-speed broadcast system of data/software updates can be sent to many switching offices simultaneously with a guarantee of high accuracy of reception.
摘要:
A terminal adapter for guaranteeing the quality of service of both voice and data packets is disclosed. Such quality is ensured by inserting gaps between successive data packets in a stream of multiplexed data and/or voice packets. A gap after a particular data packet is proportional to the size of that particular data packet. In this way, bandwidth is preserved for any voice packets that may have arrived during the transfer of the data packet as well as for any voice packets that arrive during the gap. The unconstrained upstream data bandwidth and the bandwidth used by voice calls may each be estimated by taking a plurality of instantaneous measurements of the available bandwidth and/or taking individual direct measurements. The size of data packets may be limited to a maximum size in order to ensure that time-sensitive voice packets experience only an acceptable delay in queue for transmission.