Abstract:
A wireless storage management system adapted for being used in an electronic product for wirelessly communicating with a plurality of wireless storage devices includes an identity module assigning master and slave roles to the wireless storage devices, a hard disk manage module controlling the master device to obtain disk information about the wireless storage devices and further set an archive order for the slave devices, and a file manage module managing file access according to the archive order. The electronic product is only directly connected with the master device to make the hard disk manage module and the file manage module manage the slave devices via the master device. So the electronic product can conveniently view the disk information of all of the wireless storage devices and further realize the file access to all of the devices only by being directly connected with the master device.
Abstract:
A wireless storage management system adapted for being used in an electronic product for wirelessly communicating with a plurality of wireless storage devices includes an identity module assigning master and slave roles to the wireless storage devices, a hard disk manage module controlling the master device to obtain disk information about the wireless storage devices and further set an archive order for the slave devices, and a file manage module managing file access according to the archive order. The electronic product is only directly connected with the master device to make the hard disk manage module and the file manage module manage the slave devices via the master device. So the electronic product can conveniently view the disk information of all of the wireless storage devices and further realize the file access to all of the devices only by being directly connected with the master device.
Abstract:
A multimedia intelligent business card system allows multimedia and Web content to be stored on a smart card. The invention automatically and selectively translates each file, URL, or file references as they should be when the contents of the smart card are read. The invention waits for a smart card to be inserted into a smart card reader attached to or resident in the host computer and intelligently distinguishes between a multimedia, Web-enabled, or combination smart card. A multimedia file/mp3 file/playlist or URL address is accessed from the smart card. The multimedia player required to play the accessed file/playlist or the browser required to display the accessed URL is determined and the accessed file/playlist is sent to the multimedia player and played to the user or the accessed URLA is sent to the browser and the Website is displayed to the user. The invention enables multiple auto play from multimedia files/MP3 playlist and multiple automatic connection with multiple URLs. A hotkey is defined on the host computer,for example, . If the user presses the hotkey during playback, then the invention will access the smart card for the next file, mp3 file in the playlist, or URL, if it exists.
Abstract:
A smart card security information configuration and recovery system provides a secure Web site and server that allows smart card users to easily create and obtain smart cards and passwords. The client program accesses the smart card inserted into the client computer and retrieves the smart card's ID and other user and system information and sends them to the server which creates an access key. The access key and the smart card ID are stored in the client computer's CMOS or non-volatile memory for boot-up access. The client computer will boot only if the proper smart card is installed or the proper access key is entered when the smart card is unavailable. If the user loses his smart card, then he must gain access to his computer through the access key which the server issues after the user logs in. When the user wants to get a new smart card issued, he logs onto the server which is sent the new smart card's ID that replaces the previous smart card's ID and the server generates a new access key and stores it. The new access key and the smart card's ID are stored in the client computer's CMOS or non-volatile memory for boot access.
Abstract:
A method for adaptively adjusting sizes of virtual keys and a display device using the same are provided. The display device displays a virtual keyboard, and the virtual keyboard is arranged with a plurality of virtual keys that can be chosen remotely by a plurality of direction keys of a remote controller. The method includes following: receiving cursor movement information and confirmation information transmitted by the remote controller; converting the cursor movement information and confirmation information into characters of virtual keys of a first key size configuration model of the virtual keyboard, and converting the characters into words; performing an operation on the words respectively by using a preset algorithm to generate a second key size configuration model of the virtual keyboard; and adjusting horizontal sizes of at least a part of the virtual keys of the virtual keyboard according to the second key size configuration model.
Abstract:
A smart card enabled secure computing environment system locks the host computer system from user access and waits for a smart card to be inserted into an attached or co-resident smart card reader. When a smart card is inserted into the smart card reader, the invention asks the user to enter his smart card password which is compared to the password on the smart card. If the two passwords match, the invention looks up the user's username in an access file of valid users and finds its associated access times and/or cumulative time limits in the access file. if the current time is within any of the valid access times and the user's cumulative usage time is within the specified cumulative time limit, then access is granted and the system is unlocked. The invention periodically checks the current time while the user is using the computer. If a blocked time period is entered or a cumulative time limit is exceeded, the user is logged off the machine and the computer is locked from user access. If at any time the user's smart card is removed from the smart card reader the invention will shut down all of the user's programs and lock the system.
Abstract:
A smart card enabled mobile personal computing environment system stores a user's personalized, fully functional, computing environment in a smart card. The user to specifies information required to configure the client to the user's preferred personal computing environment. The user's personal computing environment data is also used for interfacing with the user's Web browser. As the user browses the Web, the Web pages are analyzed to determine if the Web page is a logon or registration form. If the form is a registration form, the system fills in the form using the user's information from the user's personal computing environment data. If the form is a logon form, the system either captures the user's user name and password if the system has not recorded them, or inserts the user name and password in the form if the information for the Web page is in the user's personal computing environment data.
Abstract:
A smart card enabled mobile personal computing environment system stores a user's personalized, fully functional, computing environment in a smart card. A user information database is provided that is resident on a server and contains the user records of a plurality of users containing personal computing environment data with the amount of data in the user record generally larger than the storage capacity of a smart card. The user to specifies the information required to configure the client to the user's preferred personal computing environment. If the correct personal computing environment data is not resident in the smart card, the client queries the server for the information needed and updates the smart card with the new data. The user also manages his personal computing environment data stored on the smart card and the user information database. The server gives the client access to the user's records through a secure Web site. The user accesses his data, adds, modifies, and/or deletes information and transfers data to his smart card via the secure Web site. If the client has a slow or temporary connection with the server, the client is able to accommodate the user's data management needs by downloading the user's records stored on the server's user information database. The user can then manage his data without a connection to the server. Any changes to the user's records are later sent to the server to update the user information database.
Abstract:
A method of calibrating a device under test (DUT) to communicate wirelessly includes providing predetermined reference signal strength values corresponding to a reference device, the reference signal strength values including a first group of signal strength values measured at each of a first plurality of transmission power levels. The method further includes measuring signal strength values for the DUT including a second group of signal strength values measured at each of a second plurality of transmission power levels, mapping the measured signal strength values in the second group of signal strength values to corresponding reference signal strength values in the first group of signal strength values to create a plurality of mapped data pairs, and generating a lookup table according to the mapped data pairs and storing the generated lookup table in a memory of the DUT. The method also includes calibrating the DUT according to the lookup table.
Abstract:
A method of calibrating a device under test (DUT) to communicate wirelessly includes providing predetermined reference signal strength values corresponding to a reference device, the reference signal strength values including a first group of signal strength values measured at each of a first plurality of transmission power levels. The method further includes measuring signal strength values for the DUT including a second group of signal strength values measured at each of a second plurality of transmission power levels, mapping the measured signal strength values in the second group of signal strength values to corresponding reference signal strength values in the first group of signal strength values to create a plurality of mapped data pairs, and generating a lookup table according to the mapped data pairs and storing the generated lookup table in a memory of the DUT. The method also includes calibrating the DUT according to the lookup table.