摘要:
A system and method for providing telephony and high-speed data access over a broadband access network, comprising a network interface unit (NIU) coupled to a backup local exchange carrier (LEC) line, the broadband access network coupled to the NIU, an intermediate point-of-presence (IPOP) coupled to the broadband access network, and at least one external access network coupled to the IPOP. The system also provides for a fail-safe mode in which the NIU supports the LEC line for lifeline services.
摘要:
A network interface unit is provided for use intermediate a LAN and a public or private network, or a combination of both, for establishing secure links to a VPN gateway. Login by a LAN client with the network interface unit, addressing, authentication, and other configuration operations achieved using a web page-based GUI are applied in establishing tunnels from LAN clients to desired VPN destinations. Illustrative network interface units include a DHCP server and provide encryption-decryption and encapsulation-decapsulation of data packets for communication with VPN nodes. Configuration and connection of a client are further enhanced by a built-in DNS server and other functional servers to provide a high degree of autonomy in establishing connections to a desired VPN gateway via an ISP or other public and/or private network links to. The interface unit then performs required authentication exchanges, and required encryption key exchanges.
摘要:
Disclosed are a system, method and computer-readable medium for organizing images. A method aspect relates to receiving an image into a device, receiving incidental information associated with the image, organizing the image and the incidental information into a data structure such as a sparse array, classifying the received image with an image classifier and storing the classified image in an image database, receiving a search query and responding to the search query by searching for and retrieving matching images in the image database based on a comparison of the image search query to the data structure.
摘要:
A method and system for location determination and guidance using radio frequency identification (RFID) are disclosed. A location of a mobile RFID reader can be determined by detecting stationary RFID tags located at fixed locations. Each RFID tag stores location information associated with its position as well as location information of at least one other RFID tag. The location information stored by each RFID tag can be used to direct a user from one RFID tag to another. Thus, RFID technology is also used to guide mobile RFID reader between the fixed locations of the stationary RFID tags.
摘要:
The preferred embodiments include a method, system or computer-readable storage medium for identifying analog access line impairments in a communications network. The embodiments include determining a ping packet loss count and a ping failure count from digital packet loss data associated with at least one analog access line. The embodiments also include generating a line designation for the at least one analog access line in response to the ping packet loss count exceeding a first threshold and the ping failure count exceeding a second threshold. Also, a plurality of pings can be transmitted during a testing period, the digital packet loss data being generated in response to the plurality of pings. The first threshold can represent at least a three percent ping packet loss. The second threshold can represent the ping failure count being at least ten percent of a total number of the plurality of pings.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
A method of accumulating a web includes pivoting subsets of rolls to a generally vertical alignment; moving one set of rolls past the other; passing the web between the sets of rolls; moving one set of rolls past the other to engage the web; pivoting the subsets to a generally horizontal alignment; moving the web alternatively between the subsets; and moving the sets apart to accumulate the web and together to discharge the web. A web accumulator includes at least two sets of rolls. Each set of rolls has subsets of rolls. The subsets have two consecutive staggered rolls. The accumulator has a web path defined by alternating between subsets of the first set and subsets of the second set.
摘要:
A method and apparatus for establishing traffic priorities in an IP network connected with multiple communication sources is disclosed. Different types of packets such as voice packets and data packets are received for transmission over a single network access link. In order to assure quality voice transmissions, voice packets are given priority over data packets by limiting a transmission rate from a data input queue whenever voice packets are detected in a voice input queue. Different combinations of interleaved voice and data packets help to alleviate packet congestion while maintaining priority for voice packets. In one aspect of the invention, priority for voice packets is further accomplished by limiting the size of data packet frames. In some instances when no voice packets are awaiting transmission, data packets are transmitted at a maximum rate in order to make full use of the network access link bandwidth. The invention is particularly beneficial when implemented over cable and DSL network access links with slow upstream feed rates.
摘要:
A method and apparatus for providing radio communication with an electronic object in a local environment are disclosed. For example the method receives via a mobile endpoint device of a user at least one first digital certificate associated with the local environment from a trusted source, and a second digital certificate from the electronic device deployed in the local environment via a wireless connection. The method then authenticates the electronic device using the at least one first digital certificate and the second digital certificate.
摘要:
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.