摘要:
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
摘要:
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
摘要:
Aluminum-air battery units and stacks are provided with frames configured to mechanically support the anode of each unit, within a housing configured to support the frame and the air cathode(s) mechanically, sealably hold the electrolyte within the housing and in fluid communication with openings in the housing—forming one or two sided electrochemical cell in each unit. The frame comprises a protective strap configured to protect edges of the rectangular anode against corrosion by the electrolyte during operation, and also an external trapezoid shape that is configured to press the protective strap against the edges of the rectangular anode upon insertion of the frame with the anode into the housing. Various embodiments comprise, spacers between the anode and cathodes and grids supporting airways to the cathodes. In disclosed configurations, anode may be replaced after electrolyte evacuation while maintaining the stack sealed and quickly ready for renewed operation.
摘要:
Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.
摘要:
Digital device detox bands are disclosed. For one example, a digital device band comprises an elastic part to stretch around a digital device having one or more sensors, and a cover connected to the elastic part to be placed over at least one of the one or more sensors. The cover is positioned to cover the one or more sensors such that the one or more sensors are prevented from activating the digital device when in a sleep mode The one or more sensors include a camera, a touch sensor, or an activation button to activate the digital device. The elastic part stretches horizontally or vertically to snugly fit around the digital device which can be a mobile phone, mobile computing device or pad having varying dimensions.
摘要:
One embodiment relates to a processing method for a communication intended for at least one receiving terminal. The method may comprise receiving a communication intended for the at least one receiving terminal and obtaining a certified identifier and an uncertified identifier of a sender of the communication, the identifiers being comprised in a signal message for the communication. The method may further comprise comparing the certified identifier with the uncertified identifier and processing the communication including a process for searching for the certified identifier in a list containing certified identifiers for senders associated with uncertified identifiers of those senders; the processing process being based on the results of the comparison process and the searching process.
摘要:
A Web application (such as a workforce management application) on a cloud computing platform controls telephony software used by an agent who operates a remote agent computer. The telephony software may reside on the agent computer, may reside in the cloud and be used by the agent using a browser, or may reside in the cloud and include a client on the agent computer. The agent does not have access to login credentials of the telephony software and cannot log in. The Web application remotely controls the telephony software using an API and makes decisions based upon the scheduled shift activities of the agent or demand for tasks within the enterprise or call center. The Web application is able to log the agent in to or off of the telephony software or to change the status of the agent within the telephony software.
摘要:
A method and a system for displaying information and content in a lock screen system having a plurality of screens so as to provide a screen lock for preventing an unintended input of a user terminal device, and a computer-readable recording medium. The method includes setting information and content on a plurality of lock screen, displaying the plurality of lock screens, providing a screen movement between the plurality of lock screens, executing an existing external application so as to provide detailed information for the information and content displayed on the plurality of lock screens, unlocking the plurality of lock screens, and posting an advertisement on a part of the plurality of lock screens. Users can easily confirm simple information and content and use the as a new medium and means for expressing themselves by setting the lock screen windows according to the personalities of the users.
摘要:
The present invention relates to an information processing unit, such as a mobile phone, equipped with a fingerprint sensor and reconciles size reduction with operability at a high level. The present invention is provided, adjacent to a operation panel, with a V-shaped groove which contains a first slope stretching away from the operation panel and slanting downward and a second slope stretching further away from the operation panel and slanting upward, where the V-shaped groove contains a fingerprint sweep sensor which detects a fingerprint on a finger moved along the first slope and the second slope.
摘要:
A method, system and wireless communications device providing location-based control of wireless communications device features provides security and nuisance avoidance for persons or organizations controlling particular areas in which the devices are not desirable for use. The location of the device is determined by triangulation or via communication of location information from the device, such as GPS information. The services provider determines whether or not the devices are within a controlled area for which features of the device are to be disabled, and disables those features if the device is in such a zone. The service provider maintains a database of zone coordinates and feature sets to disable for each zone. Features that may be disabled include: cameras, text messaging, ringers and/or voice communications. The service provider may also entirely disable a device when the device is located within a particular zone.