摘要:
A method and apparatus for validating a terminal for access to a network that includes a central office having a memory for storing an equipment identity record and a local office having a memory for storing a subscriber record and an access count. The equipment identity record and the subscriber record each store an access authorization status of the terminal. Network access for the terminal is requested at the local office and a value of the access count at the local office is incremented when the value of the access count is less than a predetermined number. The access status of the terminal stored in the equipment identity record at the central office is requested by the local office when the terminal requests access for the first time or the value of the access count equals the predetermined number. The access authorization status of the terminal stored in the equipment identity record is sent to the local office in response to the request. The requested access status of the terminal is received at the local office and stored in the subscriber record. The value of the access count is reset in response to receiving the requested access status and access to the network is provided based on the access status stored in the subscriber record.
摘要:
A protective cover for use on a device having a switch. The protective cover prevents inadvertent or accidental operation of the switch, while allowing deliberate or intentional operation of the switch with the protective cover in place. The protective cover includes a plate and a pair of access apertures defined by the plate. One of the pair of access apertures is positioned to enable operation of the switch from a first position to a second position, and the other of the pair of access apertures is positioned to enable operation of the switch from the second position to the first position. The area of each access aperture is of suitable size to prevent inadvertent operation of the switch. The plate is attached to the device using attaching means that allows the plate to be attached to the device in only one orientation.
摘要:
A computer system has a plurality of non-compatible clients and servers selectively interconnected over a network, each client capable of initiating an application in which a related compatible server is involved. Communication between the clients and servers involve a first registry process including the acceptance of application specific messages from a client, destined for a preselected server, and encapsulating them into standard registry specific messages. The routing of the messages is determined by a database that responds to a verb command, from a particular client, to provide routing data. Next, there is translation of the registry specific messages into a preselected protocol. A second registry process occurs at a distant end to restore the message, after passing through the network. The second registry accepts the translated messages and converts them from protocol format to the original application specific format for use by the preselected compatible server.
摘要:
A system and method for ensuring user privacy in a messaging system where a message is sent from a sender to a recipient via a service provider. Information pertaining to the identification of a sender and recipient of a message is encrypted so that a third party cannot determine who is sending the message to whom. Specifically, delivery information of the message is reformatted to indicate that the service provider is the recipient. The identification of the actual recipient is encrypted and sent along with the message to the service provider. Upon receipt, the service provider decrypts the actual recipient information to determine the identification of the actual recipient. The service provider reformats the delivery information to indicate that the actual recipient is the recipient of the message and that the service provider is the sender of the message. The identification of the actual sender is encrypted and sent along with the message to the actual recipient. The recipient receives the message from the service provider. The recipient may decrypt the encrypted identification of the actual sender to learn who sent the message. The message contents may optionally be encrypted as well to ensure message privacy as well as user privacy.
摘要:
A dynamic project management system includes a server network and a master database. The network is configured to identify a personnel resource pool including a plurality of users. A project planning tool is used to effect the project plan including a plurality of tasks to be performed by the users in accordance with respective time schedules. The network is configured for translating the project plan into the master database to effect an assignments table including a list of project tasks assigned for completion by each of the users. Time sheets are periodically prepared in the master database from the assignments table and include a list of the project tasks assigned to a respective user and a time period record for recording time entries therein. Actual time expended in performing the tasks is fed back to the project plan for managing completion of the tasks in accordance with the time schedules. In a preferred embodiment, a funding source is mapped to the project plan so that cumulative labor cost may be tracked based on actual time expended for the project tasks.
摘要:
A system and method are provided to diversely respond to changes in network topology and segment availability that occur between the time a restoration pre-plan is developed and the time it is executed. Changes that have occurred during this time are detected when the pre-plan is implemented. Dynamic responses to these network changes are manifest as real-time adjustments to the pre-plan during its execution in the form of a segment substitution or a segment swap.
摘要:
A system and method provide prepaid telecommunication services using credit or debit cards in a telecommunication network including a central data base. The system monitors card balances while blocking multiple use of card balances and sends warning messages to subscribers on card balances which approach a threshold amount. Upon initiation of a telephone call, a subscriber card balance corresponding to the subscriber's credit or debit account is retrieved from the central data base. Status flags are set in the central database indicating that a telephone call is in progress for that account. A switching station monitors the telephone call and initiates an alarm when the call time approaches a threshold amount specified for the card balance. The system announce to the subscriber and/or blocks the termination of the call when the threshold amount has been exceeded and a further limit specified for the card balance has been reached. The card balance in the central data base and the status flags are changed upon completion or termination of the call.
摘要:
A first PCS unit monitors carrier activity of other PCS units in an unlicensed frequency band adjacent to a licensed frequency band used by the first PCS unit, which has a microprocessor that compiles a history table of this other carrier activity. The first PCS unit then uses the history table to transmit on the licensed frequency band an interference signal synchronized with the predicted occurrence of the other carrier activity such that the permitted sideband signals of the interference signal in the adjacent unlicensed band causes the other PCS units to stop broadcasting on the adjacent unlicensed band. The first PCS unit then begins broadcasting on both the adjacent unlicensed band and the licensed band, a message being embedded in these broadcasts to advise intended receiving PCS units that both bands are now available for communication sessions with the first PCS unit.
摘要:
A system and method for renaming a title of a window that has been created and is currently displayed on a computer screen. When a user wants to rename a window's title, the user first brings the window into focus; that is, he makes the desired window the active window. The user then presses a hot-key, or key combination. Upon receiving the hot-key, the present invention displays a pop-up window prompting the user for a new window title. After entering the text for the new window title, the present invention changes the title of the active window to the new title that the user entered. In addition, the present invention ensures that the new title is reflected in a task list of executing applications.
摘要:
A system and method for efficient routing of communication paths in a telecommunications system. The system comprises a telecommunications network having a pivot node, a destination node, and a release node connected to the pivot node and having a possible connection to the destination node. The method includes attempting to establish a direct connection between the destination node and the pivot node. An attempt is initially made to establish a direct connection between the destination node and the pivot node. If the destination node and the pivot node can be connected directly, then the connection between the pivot node and the release node is released. If the attempt to directly connect the destination node and the pivot node fails, a direct connection is established between the destination node and the release node. The failure to connect the destination node and the pivot node can be indicated by two methods. In the pivot method, the pivot node sends a failure indication to the release node. In the destination method, a timer is started in the release node when the connection attempt begins; the expiration of the timer indicates failure.