摘要:
A method, apparatus and computer product for masking speech. The system includes a signal acquiring apparatus for generating an electrical signal representative of the speech; a processing apparatus for using the electrical signal to provide an audio signal which cancels the speech; and a signal generator, also referred to as a babble generator, for providing a speech masking signal to mask any speech not canceled. The masking signal is generated by processing the speech in one of several ways so that its content is not intelligible.
摘要:
This invention provides systems, apparatus and methods for object management, employing agents for all personal computer objects. Personal objects survive in direct proportion to the degree to which they possess attributes that give them a competitive advantage in the use of the computing systems storage and name spaces. It employs an important competitive attribute of future utility. Since it is not always possible to accurately predict future utility, assessment of competitive advantage is based on secondary attributes that can be computed and that correlate with future utility, to a greater or lesser degree. It uses a ‘coordinating mechanic’ that monitors and controls relationships between personal objects and their agents. The term “object management” applies to computer systems, but is not necessarily limited to computer entities
摘要:
A device 60 for time-shifting a first signal set with respect to a second signal set, as compared to the time sequence in which they were received, includes a receiver 44B, 46B, a storage means 44C, 46C, 70, a central processing unit 66, and a user interface 72. The first signal set 38 bears a cache marker 34 that directs the CPU to store it in a local storage. The second signal set 40 bears a recall marker 36 that uniquely identifies the first signal set 38 through the cache marker 34, and that determines a sequence in which the first and second signal sets are to be output. The CPU uses the recall marker and cache marker to sequence the first and second signal sets relative to one another in time that differs from the timed relation in which they were received. By storing the first signal set in a local storage, it need be broadcast or transmitted only once, eliminating the need to re-broadcast recurring commercial advertisements and conserving bandwidth.
摘要:
A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.
摘要:
A method, apparatus and computer product that, in a system having a client computer, and apparatus for connecting the client computer to a network having a server for backing up the client computer, enables transferring data from the client computer to the server, by connecting the client computer to the network; backing up data on the client computer to a storage device attached to the network when the client computer is connected to the network; and transferring the data from the storage device to the server, preferably at a time determined by the server.
摘要:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
摘要:
The authenticity of a website is tested with software that runs on a personal computing device and a service that is provided via the Internet. The software on the personal computing device is in the form of a proxy, or transparent component in the Internet Protocol implementation. The proxy receives all outbound messages, analyzes them and forwards or modifies them without the user's intervention. The service tests the IP address and/or the behavior of the target website.
摘要:
Methods and devices for securely providing personalities to reconfigurable hardware. Reconfigurable hardware is provided with one or more domains. At least one domain serves as a gatekeeper domain and another domain serves as a task domain. A service provider provides an authentication and security personality to the gatekeeper domain. The hardware is shipped to the user. A user then accesses the service provider via a network connection and downloads a task personality into the task domain, but only if the personality in the gatekeeper domain allows the download to take place. Once the task personality completes a task, the user may download another task personality into the task domain, if permitted by the personality loaded in the gatekeeper domain. The domains and personalities are managed and made available by the service provider.
摘要:
The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when the software requiring the patch is needed; or patching may be blocked to prevent unwanted software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. In still further circumstances, a particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.