ScienceON 검색
ScienceON '특허' 검색
더보기No | 제목 / 내용 |
---|---|
1 |
INTERNET CALL WAITING WITH VOICE MAIL SYSTEM THAT PROVIDES MONITORING DURING RECORDING / DUNLAP, David, P. An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated. |
2 |
DOWNLOADING OF DATA TO SECURE DEVICES / Tang, Lawrence W. An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor. |
3 |
Downloading of data to secure devices / Combined Conditional Access Development & Support, LLC An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor. |
4 |
Downloading of Data to Secure Devices / COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLC. An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor. |
5 |
Downloading of data to secure devices / Combined Conditional Access Development And Support, LLC An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor. |
6 |
Internet call waiting with voicemail system that provides monitoring during recording / Combined Conditional Access Development And Support, LLC An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated. |
7 |
Internet call waiting with voicemail system that provides monitoring during recording / Nortel Networks Limited An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated. |
8 |
METHOD AND APPARATUS FOR PROVIDING A BORDER GUARD BETWEEN SECURITY DOMAINS / TANG, LAWRENCE W., An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated. |
9 |
METHOD AND APPARATUS FOR PROVIDING A BORDER GUARD BETWEEN SECURITY DOMAINS / TANG, Lawrence W., The present invention discloses an apparatus and method for defining and enforcingrules of transition between two security domains, e.g., a transport domain anda persistent security domain. In turn, a border guard, e.g., a security device,is provided between these two domains that enforce rules for transition betweenthe two security domains. This novel approach of defining a transport domainand a persistent security domain simplifies the classification of the digitalcontent and its movement through the system. Namely, the border guard once establishedbetween the two systems can enforce DRM rules associated with how contents aremoved between the two domains. |
10 |
METHOD AND APPARATUS FOR PROVIDING A BORDER GUARD BETWEEN SECURITY DOMAINS / TANG, LAWRENCE W., The present invention discloses an apparatus and method for defining and enforcingrules of transition between two security domains, e.g., a transport domain anda persistent security domain. In turn, a border guard, e.g., a security device,is provided between these two domains that enforce rules for transition betweenthe two security domains. This novel approach of defining a transport domainand a persistent security domain simplifies the classification of the digitalcontent and its movement through the system. Namely, the border guard once establishedbetween the two systems can enforce DRM rules associated with how contents aremoved between the two domains. |
ScienceON '논문' 검색
더보기ScienceON '보고서' 검색
더보기No | 제목 / 내용 |
---|