摘要:
Methods, apparatuses and computer-readable media for creating a spatial bookmark are provided. A method includes performing an action at a near location which causes a spatial bearing parameter corresponding to a real-time video image captured by a video-camera platform at a remote location to be stored in a computer-readable memory, wherein the video-camera platform has a controllable LOS. Performing an action at the near location that designates to a computer an image displayed on a screen, wherein the image is representative of the real-time video image, thereby causing the computer to retrieve the spatial bearing parameter from the computer-readable memory, and performing an action causing the computer to aim the video-camera platform along a LOS, wherein the video-camera platform captures a real-time video image that is received at a screen for display at the near location.
摘要:
The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.
摘要:
A method and apparatus for botnet analysis and visualization. Network traffic is filtered to compile a list of messages. The identified messages are tokenized, classified, and aggregated and changes in the frequency of tokenized messages are identified. A display of the tokenized messages is generated and displayed via a user interface. The user interface is configured to a allow a user to review data generated based on the filtered network traffic in order to detect potential botnet activity. User input may be used to adjust filtering and tokenization of the messages.
摘要:
A sender is identified based at least in part on originator identification information associated with an incoming communication. A message recipient is then determined based at least in part on the identified sender and one or more databases associated with message recipients by comparing the originator identification information to one or more entries in the one or more databases. The incoming communication is routed to the determined message recipient of a shared mailbox of a unified messaging system. An intended recipient is identified among the owners of the shared unified messaging mailbox owners. Only the determined message recipient is notified of the deposited message, based on the dynamic information derived from each deposited message.
摘要:
A method for managing visual voicemail messages includes displaying a list of voicemail messages on a telecommunications handset, receiving user commands for operating on the voicemail messages including a delete message command and in response to a delete message command, marking a voicemail message for deletion with a delete timestamp and moving the voicemail message to a Deleted Messages folder. A Deleted Message Age Indicator function processes to control permanent deletion of voicemail messages in the Deleted Messages folder based on delete timestamps and a global Delete Time value in cooperation with a visual voicemail platform.
摘要:
Aggregates are calculated from a data stream in which data is sent in a sequence of tuples, in which each tuple comprises an item identifier and a timestamp indicating when the tuple was transmitted. The tuples may arrive out-of-order, that is, the sequence in which the tuples arrive are not necessarily in the sequence of their corresponding timestamps. In calculating aggregates, more recent data may be given more weight by multiplying each tuple by a decay function which is a function of the timestamp associated with the tuple and the current time. The tuples are recorded in a quantile-digest data structure. Aggregates are calculated from the data stored in the quantile-digest data structure.
摘要:
A mobile station in a mobile radio system can send different types of packet mode resource requests to a network, corresponding to different transfer modes that can be supported by the mobile station, a mobile station being able to use one or the other of request types corresponding to transfer modes that it supports, in accordance with its requirements. In a method of allocating packet mode resources in the mobile radio system, for signaling data transfer in the uplink direction, the signaling being liable to generate an allocation of packet mode resources in the uplink direction for user data transfer, a mobile station uses a type of packet mode resource request corresponding to a transfer mode best suited to the requirements of the user data transfer.
摘要:
A method is disclosed including passing a plurality of e-mails through a spam filter and classifying at least of the plurality of e-mails as not spam. Thereafter, the plurality of e-mails are received at each of a plurality of user computers. The method may further include receiving a plurality of reports, the plurality of reports including one report from each of the plurality of user computers that one or more of the plurality of e-mails are spam that was not classified as spam by the spam filter. Based on the plurality of reports, one or more of the plurality of e-mails is reclassified as spam and/or the spam filter is modified.
摘要:
The number of Reverse Activity Bits (RABs) equal to “1” per frame is a Congestion Overload (CO) metric used to determine whether the reverse link in a wireless communications system is in a congestion overload state due to a reverse link RF overload. When the value of the CO metric exceeds a first predetermined threshold that is indicative of a congestion overload condition, the system enters a block state where all new connection requests are blocked. Once in the block state, if the value of the CO metric does not decrease but continues to increase and exceeds a second higher threshold, the system enters a mute state. In the mute state a predetermined large percentage of existing active calls are muted. Specifically, a message is sent downlink to specific ATs instructing them to reduce their transmission rates to zero but to still maintain their active connections.
摘要:
Disclosed is a method for updating DNS of host in IPv6 stateless address auto-configuration, wherein an option is added in the RS message sent by a host and/or RA message sent by a router, said option including information for negotiation of updating DNS of host. Based on said information, the host negotiates with the router to determine whether the host or the router register, the mapping between the global address of the host and the full domain name of the host, to a DNS server, to complete updating the DNS of the host. This invention enables the host to correctly identify the matching relation between domain name suffix information and address prefix, and achieves the negotiation of updating DNS domain name between the host and the router. Since DNS updating is performed by a router instead of the host, the DNS updating would become simple and safe.