摘要:
A plurality of data packets encoded according to a first protocol are received which encapsulate data encoded according to a second protocol. A first source address is extracted from the packets according to the first protocol, it is determined whether or not the first source address is a substantial duplicate of a known assigned address. If it is a duplicate, a second source address is extracted from the encapsulated data according to the second protocol, and the first source address and said second source address are provided in an enhanced error log so that a system administrator may correct the duplicate assigned address. Enhanced embodiments of the invention included analysis of data encapsulated by a third, fourth and subsequent protocols, and automatic determination of each protocol encoding format.
摘要:
A mechanism is provided for authenticating and using a personal voice profile. The voice profile may be issued by a trusted third party, such as a certification authority. The personal voice profile may include information for generating a digest or digital signature for text messages. A speech synthesis system may speak the text message using the voice characteristics, such as prosodic characteristics, only if the voice profile is authenticated and the text message is valid and free of tampering.
摘要:
A mechanism is provided for authenticating and using a personal voice profile. The voice profile may be issued by a trusted third party, such as a certification authority. The personal voice profile may include information for generating a digest or digital signature for text messages. A speech synthesis system may speak the text message using the voice characteristics, such as prosodic characteristics, only if the voice profile is authenticated and the text message is valid and free of tampering.
摘要:
A mechanism is provided for authenticating and using a personal voice profile. The voice profile may be issued by a trusted third party, such as a certification authority. The personal voice profile may include information for generating a digest or digital signature for text messages. A speech synthesis system may speak the text message using the voice characteristics, such as prosodic characteristics, only if the voice profile is authenticated and the text message is valid and free of tampering.
摘要:
A mechanism for multiple instant messaging (IM) sessions associated with a single user name is provided. A frontend server receives user login requests and routes the instant messaging system to a back-end server. Each login associated with a particular user name is routed to the same backend server (or IM host). Messages targeted to a recipient having a plurality of active IM sessions are broadcast to all the active sessions. Messages targeted to recipients having a single IM session are unicast.
摘要:
A mechanism is provided for authenticating and using a personal voice profile. The voice profile may be issued by a trusted third party, such as a certification authority. The personal voice profile may include information for generating a digest or digital signature for text messages. A speech synthesis system may speak the text message using the voice characteristics, such as prosodic characteristics, only if the voice profile is authenticated and the text message is valid and free of tampering.
摘要:
A mechanism is provided for authenticating and using a personal voice profile. The voice profile may be issued by a trusted third party, such as a certification authority. The personal voice profile may include information for generating a digest or digital signature for text messages. A speech synthesis system may speak the text message using the voice characteristics, such as prosodic characteristics, only if the voice profile is authenticated and the text message is valid and free of tampering.
摘要:
A system and method for managing parallel SCSI device functionality is presented. A user sends a request to a vendor whereby the request corresponds to the user changing the functionality of one of the user's SCSI devices. The vendor generates and sends a key that includes a password and a functionality value to the user. The user extracts the password, extracts the functionality value, and includes them in a command descriptor block. The user includes the command descriptor block in a SCSI command, and sends the SCSI command to the user's SCSI device whereupon the SCSI device validates the password and reconfigures itself based upon the functionality value. The SCSI device returns a message to the user indicating whether the reconfiguring process was successful. In turn, the user forwards the message to the vendor so the vendor may bill the user accordingly.
摘要:
A computer implemented method, apparatus, and computer program product for displaying information within a browser. Server browser information is stored on a web server. The server browser information includes a set of first category categories and a set of second category categories. An indication of whether a user is on a public system or a private system is received by the web server. Responsive to receiving the indication that the user is on a public system, only the set of public categories of the browser information is displayed to the user.
摘要:
A computer implemented method, apparatus, and computer program product for displaying information within a browser. Server browser information is stored on a web server. The server browser information includes a set of first category categories and a set of second category categories. An indication of whether a user is on a public system or a private system is received by the web server. Responsive to receiving the indication that the user is on a public system, only the set of public categories of the browser information is displayed to the user.