본문

ScienceON 검색

ScienceON '특허' 검색

더보기
국가과학기술정보센터(ScienceON) 특허검색
No 제목 / 내용
1 INTERNET CALL WAITING WITH VOICE MAIL SYSTEM THAT PROVIDES MONITORING DURING RECORDING / DUNLAP, David, P.
An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated.
2 DOWNLOADING OF DATA TO SECURE DEVICES / Tang, Lawrence W.
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
3 Downloading of data to secure devices / Combined Conditional Access Development & Support, LLC
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
4 Downloading of Data to Secure Devices / COMBINED CONDITIONAL ACCESS DEVELOPMENT AND SUPPORT, LLC.
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
5 Downloading of data to secure devices / Combined Conditional Access Development And Support, LLC
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
6 Internet call waiting with voicemail system that provides monitoring during recording / Combined Conditional Access Development And Support, LLC
An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated.
7 Internet call waiting with voicemail system that provides monitoring during recording / Nortel Networks Limited
An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated.
8 METHOD AND APPARATUS FOR PROVIDING A BORDER GUARD BETWEEN SECURITY DOMAINS / TANG, LAWRENCE W.,
An Internet Call Waiting (ICW) service provides single-line subscribers (100) connected to the Internet with incoming call information, call screening and voice messaging capabilities. An incoming call is terminated at an ICW server (154). The caller is prompted to leave a voice message and the voice message is relayed in real-time over the Internet connection (138) to permit the subscriber to monitor the message. The subscriber can choose to answer the call at any time before the caller disconnects. Subscriber profile options specify how calls are treated. Calls may be forwarded to a second directory number, directed to a Voice-over-IP (VoIP) connection, or the Internet connection may be dropped and the call completed to the subscriber's directory number. The subscriber benefits from being able to screen voice messages in real-time, which assists the subscriber in determining how the call should be terminated.
9 METHOD AND APPARATUS FOR PROVIDING A BORDER GUARD BETWEEN SECURITY DOMAINS / TANG, Lawrence W.,
The present invention discloses an apparatus and method for defining and enforcingrules of transition between two security domains, e.g., a transport domain anda persistent security domain. In turn, a border guard, e.g., a security device,is provided between these two domains that enforce rules for transition betweenthe two security domains. This novel approach of defining a transport domainand a persistent security domain simplifies the classification of the digitalcontent and its movement through the system. Namely, the border guard once establishedbetween the two systems can enforce DRM rules associated with how contents aremoved between the two domains.
10 METHOD AND APPARATUS FOR PROVIDING A BORDER GUARD BETWEEN SECURITY DOMAINS / TANG, LAWRENCE W.,
The present invention discloses an apparatus and method for defining and enforcingrules of transition between two security domains, e.g., a transport domain anda persistent security domain. In turn, a border guard, e.g., a security device,is provided between these two domains that enforce rules for transition betweenthe two security domains. This novel approach of defining a transport domainand a persistent security domain simplifies the classification of the digitalcontent and its movement through the system. Namely, the border guard once establishedbetween the two systems can enforce DRM rules associated with how contents aremoved between the two domains.

ScienceON '논문' 검색

더보기
ScienceON 논문 검색
No 제목 / 내용
1 T. W. HUTCHISON (ed.) The Collected Works of Sir William Petty
, 2000 ; Vol. 19 , Issue 1
2 William Shakspere's Petty School, by T. W. Baldwin. 240 pp. Urbana, Illinois, University of Illinois Press, 1943. $3.00
SAGE Publications , 1946 ; Vol. 3 , Issue 1
3 X-ray occult lung cancer detected by sputum cytology. J. Bechtel, W. Kelley, T. Petty, D. Patz, G. Saccomanno. St. Mary's Hospital, Grand Junction, Colorado
SAGE Publications , 1994 ; Vol. 11 , Issue suppl1
4 Book Reviews: Textbook of Pediatric Rheumatology J. T. Cassidy, M.D. and R. E. Petty, M.D., 3rd ed., Philadelphia: W. B. Saunders and Co, 610 pp, 357 illustrations
SAGE Publications , 1996 ; Vol. 35 , Issue 3
5 Atomic Transport and Defects in Metals by Neutron Scattering Edited by C. Janot, W. Petty, D. Richter, and T. Springer (Springer-Verlag, 1986) - Process Modelling of Metal Forming and Thermomechanical TreatmentC.R. Boer, M. Rebelo, H. Rystad, and G. Schroder (Springer-Verlag, 1986)
Cambridge University Press (Materials Research Society) , 1988 ; Vol. 13 , Issue 1
6 BOOK REVIEWS
Wiley (John WileySons) , 1988 ; Vol. 28 , Issue 4
7 Incorporating Bevacizumab and Erlotinib in the Combined-Modality Treatment of Stage III Non-Small-Cell Lung Cancer: Results of a Phase I/II Trial
American Society of Clinical Oncology , 2012 ; Vol. 30 , Issue 32
8 Ketamine and the oxyhemoglobin dissociation curve :
Ovid Technologies (Wolters Kluwer) - Lippincott WilliamsWilkins , 1974 ; Vol. 53 , Issue 6
9 Tomato golden mosaic virus open reading frame Al4 is genetically distinct from its C4 analogue in monopartite geminiviruses
Microbiology Society , 1996 ; Vol. 77 , Issue 8
10 Further recommendations for prescribing, reimbursement, technology development, and research in long-term oxygen therapy. Summary of the Fourth Oxygen Consensus Conference, Washington, D.C., October 15-16, 1993.
American Thoracic Society , 1994 ; Vol. 150 , Issue 3

ScienceON '보고서' 검색

더보기
ScienceON 보고서 검색
No 제목 / 내용

QuickMenu