Abstract:
PROBLEM TO BE SOLVED: To reduce or eliminate the transmission of the undesired effects of acoustic echo coupling so as to be returned to a reception side and to provide a full duplex connection. SOLUTION: A gain control method is for acoustic echo cancellation and suppression for use with a full duplex voice terminal receiving a far-end signal from a far-end voice terminal and sending a transmit signal to the far-end voice terminal, and the full duplex voice terminal has an adaptive filter, a speaker and a microphone. The method includes: a process of reproducing the far-end signal at the speaker; a process of receiving an echo signal that is acoustically coupled from the speaker to the microphone; a process of filtering the far-end signal by the adaptive filter to generate a filtered signal; a process of calculating an error signal; a process of calculating an attenuation factor from the far-end signal, the filtered signal, and the error signal; and a process of calculating the transmit signal. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a packet encryption method wherein the computation time for encryption/decryption is reduced, and packets can be recovered even when the packets are lost. SOLUTION: The efficient packet encryption method includes: a step of creating an S-vector; a step of setting a sequence number; a step of setting a first variable; a step of setting a second variable; a step of setting a byte sequence number; a step of calculating a third variable from the second variable and the byte sequence number; a step of incrementing the byte sequence number; a step of calculating a fourth variable by adding the value within the S-vector pointed to by the third variable to the first variable; a step of specifying an encryption byte based on the value within the S-vector pointed to by the third variable and the fourth variable; and a step of exclusive ORing to generate the byte. COPYRIGHT: (C)2007,JPO&INPIT
Abstract in simplified Chinese:本发明系有关一种来电者识别系统及方法,包括能发送伴随一方的名字音译成总体字符(如拉丁语字符)之本地语言字符的一方名字。本地字符可包括中文、日文或朝鲜文字符。来电者识别信息可用来将来电方的名字显示给受话方,及/或将受话方的名字显示给来电方。来电者识别设备的用户可选择显示本地语言。每当来电者识别信息包括与用户所选择的语言匹配之本地语言名字时,本地语言名字将会显示于来电者识别设备上。否则,将会显示本地语言名字的音译。
Abstract in simplified Chinese:合成字符的自动完成是由产生表列的待菜单字或字符所支持。此表列可以由指定必须包括在待菜单字或字符内的字母或字形所产生,但与在习惯上将一指定的字母或字形加入该完成的单字或字符之次序无关。于一删减的模式中,一用户可以排除含有由用户所指定的一或多个字母或字形之单字或字符。
Abstract:
A method, apparatus and computer program product for avoiding exposed nodes in Wireless local Area Networks is presented. The method includes maintaining at a node a first timer (NAV_RTS) for a channel which, if set, prevents the node from authorizing a transmission on the channel to itself and maintaining at the node a second timer (NAV_CTS) for the channel which, if set, prevents the node from transmitting on the channel. The method further includes updating the NAV_RTS when a transmission request (CC-RTS) frame is received having a reservation duration value greater than zero and greater than a current value of the NAV_RTS, and updating the NAV_CTS when a transmission response (CC-CTS) frame is received having a reservation duration value greater than zero and greater than a current value of the NAV_CTS.
Abstract:
A technique is disclosed that enables a voice call to be initiated on the Public Switched Telephone Network (311) and directed to a VoIP telephone (303) on the Internet without the association of a unique telephone number to the VoIP telephone. In accordance with the illustrative embodiment of the present invention, a user who has a PSTN wireline telephone (302) or a PSTN cell phone associates his or her VoIP telephone (303) with the telephone number of the PSTN wireline telephone (302) or the PSTN cell phone or with both numbers. In other words, the VoIP telephone (303) is not assigned its own telephone number but shares the telephone number of the PSTN telephones (302) of its owner.
Abstract:
The present invention provides a technique for directly calling telephones via a shared telephone number, which telephones do not have telephone numbers in the address space of the Public Switched Telephone Network. This is particularly useful for visitors and guests who are, for example, temporarily at a hotel, school campus, or business.
Abstract:
A classification mechanism automatically aligns time-sensitive data streams to sequences (schedules), according to information in the packets or other information and classification criteria specified by a human network administrator, a sequence agent, an application program or otherwise. When a packet arrives at a first sequence-aware switch along a path, the packet is aligned to a new or existing sequence. When a new sequence is established, appointments are reserved at sequence-aware switches along the path. The packet is placed in a queue, based on its classification. When the packet reaches the head of the queue, at that queue'’ appointment time, the switch forwards the packet along the path. If possible, appointments have been reserved at subsequent switches along the packet’s path, so the packet can be forwarded through the subsequent switches without delay. Packets that do not match any classification criteria are handled on a best-effort basis.
Abstract:
A method and apparatus are disclosed for managing components of a secret key according to a secret sharing scheme. The disclosed secret sharing scheme divides a secret value, R , into n secret components ( R l , R 2 , ..., R n ) and one super component, S , in such a way that R can be computed from (i) any k or more R i components (k R i . The secret components ( R l, R 2 , ..., R n ) are distributed to a number of authorized users. A multiple threshold secret sharing scheme assigns various users in a group into one of a number of classes. Each user class has a corresponding threshold level that indicates the number of users that must come together with their assigned components to obtain access to the shared secret. The multiple threshold scheme divides the secret into n components each having an assigned threshold level (i.e., the number of such components that are required to obtain the secret). Any component having a lower threshold level can satisfy the role of a component having a higher threshold level. The multiple threshold scheme provides a hierarchical scheme that allows the secret, R , to be shared among different groups of people with different thresholds.
Abstract:
A method and apparatus are disclosed for delivering enhanced messages to a calling party. A message document address is provided to the calling party that is a pointer or hyperlink to a message document containing a message for a calling party, such as a uniform resource locator (URL) identifying an Internet document. The calling party may receive a message, e.g., when the called party is not available or containing a list of user-specific menu options in an IVR system. The message document can be (I) a static document created; (ii) a default document created; (iii) a dynamically generated document based on one or more rules that alter the content of the document based on various characteristics of the calling party or the call (or both). The presentation of the message document address to the user can be conditioned upon the satisfaction of one or more rules, such as when the called party is unavailable or based on one or more predefined characteristics of the calling party or the call (or both).