Method for controlling cordless telephone device, handset of cordless telephone device, and cordless telephone device
    4.
    发明授权
    Method for controlling cordless telephone device, handset of cordless telephone device, and cordless telephone device 有权
    用于控制无绳电话设备,无绳电话设备的手机和无绳电话设备的方法

    公开(公告)号:US09280314B2

    公开(公告)日:2016-03-08

    申请号:US14514659

    申请日:2014-10-15

    摘要: Disclosed is a method for controlling a cordless telephone device for use in a system that allows remote control of a home electric appliance. The method includes a first generation step of causing a first generation unit in a handset to encode audio input via a sound receiving unit in the handset to generate a first stream, and a first transmission step of transmitting the first stream to a base unit. The first generation step includes causing the first generation unit to generate instruction bit information and a first instruction stream when a first trigger indicating a request to start the remote control is given to the first generation unit. The first transmission step includes transmitting the instruction bit information and the first instruction stream to the base unit through a multiplexing scheme that is common to transmission of a first stream generated when the first trigger is not given.

    摘要翻译: 公开了一种用于控制家用电器远程控制的系统中使用的无绳电话设备的方法。 该方法包括:第一生成步骤,使手机中的第一生成单元经由手机中的声音接收单元对音频输入进行编码,生成第一流,以及将第一流发送到基本单元的第一发送步骤。 第一代步骤包括当向第一代单元提供指示启动远程控制的请求的第一触发时,引起第一代单元产生指令位信息和第一指令流。 第一发送步骤包括:通过对未发送第一触发时产生的第一流的传输通用的复用方案,向基本单元发送指令比特信息和第一指示流。

    Risk information processing method and server device

    公开(公告)号:US10521749B2

    公开(公告)日:2019-12-31

    申请号:US14965715

    申请日:2015-12-10

    摘要: A risk information processing method used in a risk information processing system that manages a degree of risk at a spot where a moving object is located includes: storing, as risk information in a storage, a degree of risk for a combination of spot and situation; and estimating first risk information for a first combination for which a degree of risk has not been input by using three or more pieces of risk information including degrees of risk for a second combination whose spot is the same as the first combination and whose situation is different from the first combination, for a third combination whose situation is the same as the first combination and whose spot is different from the first combination, and for a fourth combination whose situation is the same as the second combination and whose spot is the same as the third combination.