Patent classifications
H04M1/72406
System and method for distributing user interface device configurations
A system that incorporates teachings of the present disclosure may include, for example, a system having a controller to collect a plurality of User Interface (UI) device configurations, receive a request from a computing device to download one or more of the plurality of UI device configurations, and transmit to the computing device the one or more UI device configurations requested to configure one or more UI devices of the computing device. Other embodiments are disclosed.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
System and method for authenticating called parties of individuals within a controlled environment
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Electronic device for transmitting, to cover device, data acquired from external electronic device, on basis of identification information of cover device, and control method
An electronic device for transmitting, to a cover device, data acquired from an external electronic device, on the basis of identification information of the cover device, and a control method are disclosed. An electronic device according to various embodiments of the present document comprises: a housing; a first antenna and a second antenna which are accommodated in the housing; a first wireless communication circuit set to provide first wireless communication by using the first antenna; a second wireless communication circuit set to provide second wireless communication by using the second antenna; and a control circuit accommodated in the housing and operably connected to the first wireless communication circuit and the second wireless communication circuit, wherein the control circuit detects coupling between a cover device, which can be coupled to one side of the electronic device, and the electronic device, and the cover device includes a third antenna and a third wireless communication circuit set to provide the first wireless communication by using the third antenna, and can be set to: acquire, through the first wireless communication circuit, identification information related to the cover device from the cover device at least on the basis of the detection; acquire, through the second wireless communication circuit, data corresponding to the identification information from an external electronic device; and transmit, through the first wireless communication circuit, the acquired data to the third wireless communication circuit included in the cover device.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
SYSTEM AND METHOD FOR AUTHENTICATING CALLED PARTIES OF INDIVIDUALS WITHIN A CONTROLLED ENVIRONMENT
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
Firmware upgrade method and device, and storage medium
A firmware upgrade method can be applied to a terminal, and include: receiving a broadcast message for broadcasting an updated firmware type sent by a cloud server; sending firmware information matching the firmware type to the cloud server; and receiving a firmware upgrade package corresponding to the firmware information pushed by the cloud server. As a result, the space of the storage medium of the terminal is effectively saved, and the efficiency of firmware upgrade is improved.
Information processing method and apparatus, storage medium, and electronic device
An information processing method, comprising: in response to that a third party application receives an information display instruction, generating a download instruction; transmitting the download instruction to a processing platform, for prompting the processing platform to download a configuration file according to the download instruction; controlling the processing platform to parse the configuration file to generate display parameters; obtaining target information by analyzing the display parameters, and displaying the target information in the third party application.
Information processing method and apparatus, storage medium, and electronic device
An information processing method, comprising: in response to that a third party application receives an information display instruction, generating a download instruction; transmitting the download instruction to a processing platform, for prompting the processing platform to download a configuration file according to the download instruction; controlling the processing platform to parse the configuration file to generate display parameters; obtaining target information by analyzing the display parameters, and displaying the target information in the third party application.
Surgical instrument utilizing drive signal to power secondary function
A surgical instrument connectable to a surgical energy module that is configured to provide a first drive signal at a first frequency range for driving a first energy modality and a second drive signal at a second frequency range for driving a second energy modality is provided. The surgical instrument can comprise a surgical instrument component configured to receive power from a direct current (DC) power source, an end effector, and a circuit. The circuit can be configured to convert the first electrical signal to a DC voltage, apply the DC voltage to the surgical instrument component, and deliver the second energy modality to the end effector according to the second drive signal. Alternatively, the circuit can be disposed within a cable assembly configured to connect the surgical instrument to the surgical energy module.