scispace - formally typeset
Search or ask a question

Showing papers on "Internet appliance published in 2002"


Patent
06 May 2002
TL;DR: In this paper, a cross-referencing resource is proposed for disseminating over the Internet product information produced and maintained by product manufacturers using existing universal product codes (bar codes) as access keys.
Abstract: Methods and apparatus for disseminating over the Internet product information produced and maintained by product manufacturers using existing universal product codes (bar codes) as access keys. A cross-referencing resource preferably implemented by the existing Internet Domain Name System (DNS) receives Internet request messages containing all or part of a universal product code value and returns the Internet address at which data or services relating to the identified product, or to the manufacturer of that product, may be obtained. By using preferred Web data storage formats and protocol which conform to XML, XLS, XLink, Xpointer, RDF and Web service standards specifications, product and company information may be seamlessly identified, retrieved and integrated with information from other sources. A “web register” module can be employed to provide an Internet interface between a shared sales Internet server and an otherwise conventional inventory control system, and operates in conjunction with the cross-referencing server to provide detailed product information to Internet shoppers who may purchase goods from existing stores via the Internet.

221 citations


Patent
Stephen Weinstein1, Jun Li1, Junbiao Zhang1, Nan Tu1
30 Jan 2002
TL;DR: The Public Access Mobility LAN (PAMLAN) as mentioned in this paper supports virtual operator LANs representing different network services providers, authorization and accounting mechanism, support of multiple air interfaces, and local IP mobility.
Abstract: Public wireless communications will increasingly extend into wireless LAN (WLAN) environments in order to meet the ubiquitous access, high data rate, and local services demands of future Internet appliances. By relying on IP-level services mechanisms, the Public Access Mobility LAN (PAMLAN) can simultaneously support different air interfaces, franchises for multiple services providers, and a multi-segment LAN environment including handoffs. The PAMLAN supports virtual operator LANs representing different network services providers, authorization and accounting mechanism, support of multiple air interfaces, and local IP mobility. A router associated with each base station realizes this highly distributed IP networking environment, and a QoS-enabled switched Ethernet core supports virtual networks and QoS services.

190 citations


Patent
04 Nov 2002
TL;DR: In this paper, a system for retrieving and disseminating information records from Internet sources includes a client device and an intermediary server system, including software, between the client devices and the Internet, which collects a record specific to a client from an individual one of said Internet sources in a first form in which the record is recorded at the Internet source, transforms the record from the first form to a second form specific to an application other than an Internet browser application, the application executable by the client device, and transmits the transformed record to the clientdevice for display in the application, for
Abstract: A system for retrieving and disseminating information records from Internet sources includes a client device and an intermediary server system, including software, between the client device and the Internet. The system collects a record specific to a client from an individual one of said Internet sources in a first form in which the record is recorded at the Internet source, transforms the record from the first form to a second form specific to an application other than an Internet browser application, the application executable by the client device, and transmits the transformed record to the client device for display in the application other than an Internet browser application executable by the client device. In some cases the client device connects by a data link that is not Internet-compatible link. Data mining on the Internet specific to clients and client devices is taught, with aggregation services and synchronization for keeping a client up-to-date efficiently for changing data content.

159 citations


Proceedings ArticleDOI
Hoyoung Kim1, Jinwoo Kim1, Yeonsoo Lee1, Minhee Chae1, Youngwan Choi1 
07 Jan 2002
TL;DR: The results indicate that the use contexts of mobile Internet are concentrated rather than being widely diverse, and the different contexts present unique usability problems.
Abstract: Mobile Internet, which is a combination of the Internet with mobile devices, is becoming increasingly popular. Mobile Internet is primarily different from stationary Internet in that it may be used in various contexts, whereas stationary Internet is mostly used in predetermined environments. However, it is far from clear in what places and situations mobile Internet has been used and what the impact of the contexts has been on the ease of use. This paper proposes a framework for studying the use context relevant to mobile Internet. It then presents the results of an empirical study of the use context and service usability for mobile Internet using monitoring methods. The results indicate that the use contexts of mobile Internet are concentrated rather than being widely diverse. Moreover, the different contexts present unique usability problems. The paper concludes by discussing the theoretical and practical implications of the results.

158 citations


Patent
17 Apr 2002
TL;DR: In this paper, a mobile bar code driven information access terminal for remotely accessing package delivery instructions for an Internet information server on the Internet is presented, where a bar code symbol is applied to a package to be delivered to a destination.
Abstract: A mobile bar code driven information access terminal for remotely accessing package delivery instructions for an Internet information server on the Internet. A programmed bar code symbol reader is integrated within a hand-supportable housing, for reading a bar code symbol encoded with a Uniform Resource Locator (URL) specifying the location of an Internet information resource to be accessed and displayed. The bar code symbol is applied to a package to be delivered to a destination. A computing platform is disposed within the hand-supportable housing, and supports an Internet browser program for accessing and displaying the Internet information resource specified by a URL. A network communication device interconnects the Internet browser program to an Internet information server by way of a 2-way wireless telecommunication link. The Internet information server hosts the Internet information resource and the Internet information resource contains package delivery instructions for delivering said package to a destination.

65 citations


Journal ArticleDOI
TL;DR: In this paper, the geographic spread of commercial Internet service providers (ISPs), the leading suppliers of Internet access in the US, is analyzed and the location of 40,000 access points, local phone numbers offered by commercial ISPs, in the Fall of 1997.

64 citations


Patent
28 Mar 2002
TL;DR: In this article, the geographic location of an Internet user is determined and correlated with the Internet protocol address of the user during an active Internet session, and this information is stored by the user's Internet service provider so that Internet services can be provided to the user based on the location.
Abstract: The geographic location of an Internet user is determined and correlated with the Internet protocol address of the user during an active Internet session. This information is stored preferably by the user's Internet service provider so that Internet services can be provided to the user based on the user's location. The user's location can supplement a request for services made by the user so that the responding web site or application will have additional information on which to base a reply. Alternatively, a web site or application may initially seek to send messages and/or information to users within a predetermined geographical location.

62 citations


Patent
26 Feb 2002
TL;DR: A computer controlled digital electronic display system for disseminating targeted public advertising, at select times and in select locations, in combination with a system for providing publicly available Internet access is described in this paper.
Abstract: A computer controlled digital electronic display system for disseminating targeted public advertising, at select times and in select locations, in combination with a system for providing publicly available Internet access. It is designed to provide wireless connectivity between portable consumer electronics and the Internet. Also described is a business method for the placement of revenue generating Internet services including wireless based transactions, funded essentially by advertising revenue.

61 citations


Journal ArticleDOI
TL;DR: Analysis of a range of survey, interview and usage-log data on the level of use of broadband Internet by households in the UK and Europe suggests that, while there are few socio-economic and demographic differences, broadband users tend to use a wider range of applications, access them more frequently and for longer.
Abstract: This paper reports analysis of a range of survey, interview and usage-log data on the level of use of broadband Internet by households in the UK and Europe. It discusses the (few) discernable differences between PSTN and broadband Internet users in mid 2001. The analysis suggests that, while there are few socio-economic and demographic differences, broadband users tend to use a wider range of applications, access them more frequently and for longer. However, because most broadband users have been, on average, users of the Internet for longer than PSTN users, these effects may be to do with their Internet competencies rather than the nature of broadband Internet itself. The paper also suggests that the interaction of speed, flat rate and 'always-on' is a key feature of broadband and a key value model to the user. The paper concludes by discussing the implications of the usage patterns of these early adopters for current and future portal, application and service investment strategy.

55 citations


Book ChapterDOI
01 Jan 2002
TL;DR: In this paper, the demand for broadband access to the Internet by US households is analyzed using a very large data set of US households with over 32,000 observations, using a discrete-choice model for the demand of cable modems.
Abstract: The demand for Internet access continues to grow at a dramatic rate. While the primary mode of access has been dial-up service, recent innovations have allowed even residential subscribers the option of obtaining affordable highs-peed or broadband access. In particular, cable television companies have begun to offer cable modems and many local exchange telephone companies are beginning to offer various forms of digital subscriber line (DSL) service. This chapter analyzes the demand for broadband access to the Internet by US households. Using a very large data set of US households with over 32,000 observations, we estimate a discrete-choice model for the demand for Cable Modems. Preliminary elasticity estimates indicate cable-modem Internet access demand to be price-elastic.

48 citations


Journal ArticleDOI
TL;DR: The results of a survey of small businesses' use of the Internet were reported in this paper, showing that almost eighty percent of the respondents surveyed reported using a computer in their business and almost one-half indicated that they had a web page.
Abstract: This manuscript reports the results of a survey of small businesses' use of the Internet. The telephone survey of a random sample of 120 small businesses sought to determine the proportion of businesses with Internet access, how the Internet was being used by their organization, and organizational characteristics. Almost eighty percent of the respondents surveyed reported using a computer in their business. Of that group, about 69 percent reported they had Internet access and almost half had a Web page. When asked about how the Internet was being used in their business, the most common answer was to obtain general information, followed by ordering products and supplies, obtaining supplier information, obtaining customer information, obtaining competitor information, and for entertainment purposes. Respondents who had Internet access were also asked whether they had a Web page. Almost one-half indicated that they had a Web page. Of those who did not have a Web page, about one-half planned on havin...

Journal ArticleDOI
TL;DR: A SIP-based software suite called the Columbia Internet extensible multimedia architecture (Cinema) is implemented, which is installed and integrated with the existing private branch exchange (PBX) infrastructure in the computer science department at Columbia University.
Abstract: Cost savings and the ease of developing and adding new services have motivated great interest in Internet telephony, which integrates services provided by the Internet with the public switched telephone network (PSTN). Internet telephony relies on several protocols, including the real-time transport protocol (RTP) for multimedia data transport and the session initiation protocol (SIP) or H.323 for establishing and controlling sessions. SIP can integrate with other Internet services, such as email, the Web, voice mail, instant messaging, conference calling, and multimedia collaboration. We have implemented a SIP-based software suite called the Columbia Internet extensible multimedia architecture (Cinema), which we installed and integrated with the existing private branch exchange (PBX) infrastructure in the computer science department at Columbia University. The Cinema environment provides interoperability with the PSTN, programmable Internet telephony services, and IP-based voice mail. It also integrates Web access and e-mail for unified messaging and supports multiparty multimedia conferencing. The setup lets us extend our PBX capacity and will eventually let us replace it while keeping our existing phone numbers. It also provides an environment in which we can easily add new services and features, including interoperation with existing multimedia tools, e-mail access from standard. telephones, network appliance control, and instant messaging support.

Patent
19 Feb 2002
TL;DR: In this paper, a customizable client application capable of running on all seven classes of Internet-enabled personal cellular telecommunications devices whose Internet browser launching capabilities range from being Class 0 non-Internet-enabled to Class 6 automatic internet browser launching.
Abstract: A customizable client application capable of running on all seven classes of Internet-enabled personal cellular telecommunications devices whose Internet browser launching capabilities range from being Class 0 non Internet-enabled to Class 6 automatic Internet browser launching. The client application facilitates minimum subscriber intervention for Internet session initiation from an Internet session option of an interactive display message.

Patent
24 May 2002
TL;DR: In this article, the authors present a system and method for Internet advertising through the use of an Internet based triva game, which is based on the game Trivial Pursuit.
Abstract: The present invention is a system and method for Internet advertising through the use of an Internet based triva game.

Journal ArticleDOI
TL;DR: An infrastructure-based secure proxy architecture is proposed to bridge the gap between the capabilities of Post-PC devices and the requirements of Internet services, and offers the novel ability to deal with untrusted public Internet access points.
Abstract: The Post-PC revolution is bringing information access to a wide range of devices beyond the desktop, such as public kiosks, and mobile devices like cellular telephones, PDAs, and voice based vehicle telematics. However, existing deployed Internet services are geared toward the secure rich interface of private desktop computers. We propose the use of an infrastructure-based secure proxy architecture to bridge the gap between the capabilities of Post-PC devices and the requirements of Internet services. By combining generic content and security transformation functions with service-specific rules, the architecture decouples device capabilities from service requirements and simplifies the addition of new devices and services. Security and protocol specifics are abstracted into reusable components. Additionally, the architecture offers the novel ability to deal with untrusted public Internet access points by providing fine-grain control over the content and functionality exposed to the end device, as well as support for using trusted and untrusted devices in tandem. Adding support for a deployed Internet service requires a few hundred lines of scraping scripts. Similarly, adding support for a new device requires a few hundred lines of stylesheets for the device format. The average latency added by proxy transformations is around three seconds in our unoptimized Java implementation.

Journal ArticleDOI
TL;DR: The always connected, mobile consumer is closer to reality than ever before, and the human-computer interaction community is in the perfect position to address a key need of this industry: new application discovery.
Abstract: The always connected, mobile consumer is closer to reality than ever before. Ericsson expects the world-wide number of mobile phones to exceed landline phones by 2002 and that there will be more mobile Internet subscribers than fixed Internet subscribers by 2003 (Ericsson Annual Report, 2000). The potential of advanced wireless networks far surpasses today's mobile extensions of PC and Internet applications. But these new applications are not yet clear. Leveraging competence in customer research and interaction design, the human-computer interaction (HCI) community is, therefore, in the perfect position to address a key need of this industry: new application discovery.

Posted Content
TL;DR: In this paper, the authors put forth some ideas for extending travel behavior modeling to account for interactions between travel and telecommunications, such as cellular telephones and other portable computer and communications devices, which have redefined our ability to conduct business and dynamically schedule activities while traveling or at locations away from home or workplace.
Abstract: This paper puts forth some ideas for extending travel behavior modeling to account for interactions between travel and telecommunications. Information technology (IT, sometimes referred to as communications and information technology, or CIT) is burgeoning, providing unlimited business opportunities for entrepreneurs to develop and sell IT products and services. While most of these products and services are not specifically designed to affect travel behavior, they do, often in subtle and unexpected ways. The connectivity of the Internet and the proliferation of capable and affordable home computers and communication devices have encouraged flexible work arrangements and made e-commerce the fastest growing sector of most western economies. For many people, the home has become a viable site for the conduct of certain activities that formerly could only be conducted at non-home locations. In addition, cellular telephones and other portable computer and communications devices have redefined our ability to conduct business and dynamically schedule activities while traveling or at locations away from home or workplace. The wave of technological advances that brought us the Internet, mobile phone, and personal digital assistants (PDA's) is not slowing down. The future will bring a next-generation Internet with higher speed, multimedia capability and intelligent agent technology. It will be accessible by both PC's and "Internet appliances" such as television set-top boxes, videogame consoles and smart handheld devices.

Patent
30 May 2002
TL;DR: An electronic controller for conducting trusted lightweight e-commerce transactions is presented in this article, where a trusted transactional cache (212) and the associated transactional protocol allow ecommerce transactions to be committed to a remote server extremely quickly and with little network overhead.
Abstract: An electronic controller for conducting trusted lightweight e-commerce transactions A trusted transactional cache (212) and the associated transactional protocol allow e-commerce transactions to be committed to a remote server extremely quickly and with little network overhead The end-to-end transactions are completed in just a few seconds or less The invention operates equally well on robust private networks as on unpredictable Internet or wireless networks The transaction is automatically completed following a temporary communication failure with the central site or following a temporary local controller failure The invention can advantageously be used in embedded Internet products such as fixed or mobile Internet kiosks, transactional terminals, and Internet Appliances

Patent
14 Mar 2002
TL;DR: The handheld electronic device combines the features of one or more of: a cellular telephone, Personal Digital Assistant (PDA), personal computer, Internet Appliance (IA), pager, cordless telephone, remote control unit, and Global Positioning System (GPS) into one common easy to use universal device and User Interface (UI) as mentioned in this paper.
Abstract: The handheld electronic device combines the features of one or more of: a cellular telephone, Personal Digital Assistant (PDA), personal computer, Internet Appliance (IA), pager, cordless telephone, remote control unit, and Global Positioning System (GPS) into one common easy to use universal device and User Interface (UI). In one embodiment, the handheld electronic device is approximately the size of a cellular telephone, and includes a large touchscreen Liquid Crystal Display (LCD), covering an area which would normally be used for both the display and keypad on a cellular telephone. The display and UI change to look appropriate for whatever application is in use.

Book ChapterDOI
20 Aug 2002
TL;DR: The ServiceGlobe system provides a platform on which e-services (also called services or Web services) can be implemented, stored, published, discovered, deployed, and dynamically invoked at arbitrary Internet servers participating in the Service Globe federation.
Abstract: Publisher Summary The ServiceGlobe system provides a platform on which e-services (also called services or Web services) can be implemented, stored, published, discovered, deployed, and dynamically invoked at arbitrary Internet servers participating in the ServiceGlobe federation. The next generation of Internet applications—e-services—is emerging. By an e-service, one understands an autonomous software component that is uniquely identified by a Unique Resource Identifier (URI) and that can be accessed by using standard Internet protocols like eXtensible Markup Language (XML), SOAP, or Hypertext Transfer Protocol (HTTP). An e-service may combine several applications that a user needs, such as the different pieces of a supply chain architecture. For the end-user, however, the entire infrastructure will appear as a single application. Due to its potential of changing the Internet to a platform of application collaboration and integration, e-service technology gains more and more attention in research and industry; initiatives such as HP Web Services Platform [WSP], Sun ONE [Sun], or Microsoft .NET [NET] show this development.

Journal ArticleDOI
TL;DR: An overview of wireless residential networks, security issues for these networks and security in current wireless technologies such as IEEE 802.11 and Bluetooth are provided and a security architecture based on a classification of security services, containment and algorithm agility that will be suitable for wireless residential Networks is suggested.
Abstract: The installation rate of residential networks is expected to accelerate in the next few years with wireless networking being by far the technology of choice due to attractive features such as ease of use A wide variety of traditional computing devices and embedded Internet appliances will be networked in homes However, due to the broadcast nature of these networks and the heterogeneity of devices on these networks, new security problems will arise since the different types of devices have different security requirements and capabilities We provide an overview of wireless residential networks, security issues for these networks and security in current wireless technologies such as IEEE 80211 and Bluetooth We then suggest a security architecture based on a classification of security services, containment and algorithm agility that will be suitable for wireless residential networks

Patent
19 Mar 2002
TL;DR: In this paper, an internet activity access apparatus (20) is incorporated to provide the information of the client having, the client knows, some place that the client is, and the client's location.
Abstract: An internet activity system, authenticating an internet activity by four factors, including something that the client has, something that the client knows, some place that the client is, and something that the client is. A server (10) of a casino provides an internet activity and determines authentication of a user who is requesting access to the internet activity. An internet activity access apparatus (20) is incorporated to provide the information of something that the client has, something that the client knows, some place that the client is, and something that the client is.

Journal ArticleDOI
01 Oct 2002-Leonardo
TL;DR: Ten myths about Internet Art are identified, and it is explained that online communities and listservers, along with interactive Internet artworks that trace viewers and integrate their actions into respective interfaces, prove that the Internet is a social mechanism.
Abstract: This article identifies ten myths about Internet Art, and explains the difficulties museums and others have understanding what it means to make art for the Internet. In identifying these common misconceptions, the author offers insight on successful online works, provides inspiration to Internet artists, and explains that geographical location does not measure success when making art for the Internet. The article also mentions that the World Wide Web is only one of the many parts that make up the Internet. Other online protocols include e-mail, peer-to-peer instant messaging, video-conferencing software, MP3 audio files, and text-only environments like MUDs and MOOs. The author concludes his list of myths with the idea that surfing the Internet is not a solitary experience. Online communities and listservers, along with interactive Internet artworks that trace viewers and integrate their actions into respective interfaces, prove that the Internet is a social mechanism.

Patent
06 May 2002
TL;DR: In this article, the authors proposed an antivirus network or Internet appliance and methods therefor, which consists of an interface connecting the Internet appliance to a terminal, a memory, and a network connection connecting the internet appliances to a network (such as a wide area network (WAN) or the Internet) wherein data in the network are operable with a corresponding network protocol.
Abstract: The invention provides an antivirus network or Internet appliance and methods therefor. A preferred embodiment of the Internet appliance according to the invention comprises an interface connecting the Internet appliance to a terminal, a memory, and a network connection connecting the Internet appliance to a network (such as a wide area network (WAN) or the Internet) wherein data in the network are operable with a corresponding network protocol (such as TCP/IP). Protocol-level programs are stored in the memory for receiving data being transmitted from the network to the terminal through the Internet appliance wherein the protocol-level programs are compatibly operable with the network protocol. Application-level antivirus programs are stored in the memory for detecting computer viruses in the received data serving as a firewall against the detected computer viruses for the terminal. The Internet appliance according to this particular embodiment of the invention further includes a processor (such as a central processor unit or CPU) and an operating system for implementing the protocol-level programs and the antivirus programs, wherein the antivirus programs are advantageously transparent to the terminal.

Journal ArticleDOI
TL;DR: Understanding interactivity in entertainment potentially has additional value in helping explain barriers to adoption of nonentertainment interactive media, such as electronic shopping, telework, distance learning, telemedicine, and smart house technology.

Patent
21 Mar 2002
TL;DR: In this article, the authors present a method and apparatus for pre-paying for Internet access time, which is used to access the Internet for receiving Internet content, as well as performing Internet services, such as sending/receiving e-mail.
Abstract: The present invention provides a method and apparatus for pre-paying for Internet access time. After pre-paying, the apparatus is used to access the Internet for receiving Internet content, as well as performing Internet services, such as sending/receiving e-mail. The apparatus includes a processor programmed with instructions for providing a predetermined amount of Internet access time. Hence, when the user purchases the apparatus, the user in effect pre-pays for a predetermined amount of Internet access time. The processor is programmed, for example, to provide 30 hours of Internet access time, thereby enabling the user to access the Internet for 30 hours before the apparatus is cut-off from the Internet. The processor or other device, such as an internal clock, is programmed to clock Internet usage time, either forwards or backwards, and to cut-off the Internet connection when a predetermined time is reached. If the predetermined time is not reached during an individual Internet session, the processor stores the clocked time and/or available Internet access time. When the user re-connects to the Internet, the processor retrieves the stored clocked time and/or available Internet access time and clocks the remaining time. This process continues until the clocked time is equal to the predetermined time stored within the processor. At this time, the Internet connection is disabled. The apparatus can also be used for programming the processor with additional Internet access time by connecting to a remote server and purchasing additional Internet access time, or by inserting within the apparatus a prepaid Internet access card or a prepaid Internet access smart card storing a predetermined amount of Internet access time.

Journal ArticleDOI
TL;DR: The development of a system for controlling home electrical appliances over the Internet by using Bluetooth wireless technology to provide a link from the appliance to the Internet and the Wireless Application Protocol (WAP) to provided a data link between the appliance and a mobile phone.
Abstract: This paper presents the development of a system for controlling home electrical appliances over the Internet. The need for a physical connection to the Internet is removed by using Bluetooth wireless technology to provide a link from the appliance to the Internet and the Wireless Application Protocol (WAP) to provide a data link between the Internet and a mobile phone. The paper describes the hardware and software design considerations of the system and discusses possible future developments exploiting the Jini and third generation wireless technologies.

Book
23 Sep 2002
TL;DR: This paper summarizes the research work that has been conducted in the context of the RTIPA project on policy-based QoS and security management for distributed multimedia services and presents an architecture allowing the derivation of policies from the service level down to the network level.
Abstract: This paper summarizes the research work that has been conducted in the context of the RTIPA project on policy-based QoS (Quality of Service) and security management for distributed multimedia services. It presents an architecture allowing the derivation of policies from the service level down to the network level. It is a step towards an end-to-end QoS and security management for distributed multimedia services running on the new generation of IP networks.

Journal ArticleDOI
01 Oct 2002-Allergy
TL;DR: This article describes specific EBDM‐related tools, with emphasis on internet‐enabled “how to” books; and tools to improve the quality of reporting research, to formulate questions and to search for evidence.
Abstract: At the dawn of the Information Age, the practice of evidence-based decision making (EBDM) is still hindered by many important barriers related to the decision makers, to the evidence per se or to the health system. Some of these barriers, particularly those related to the distillation, dissemination and packaging of research evidence, could be overcome by recent and ongoing developments in portable/wearable computers, internet appliances, multimedia and wireless broadband internet traffic. This article describes specific EBDM-related tools, with emphasis on internet-enabled “how to” books; and tools to improve the quality of reporting research, to formulate questions; to search for evidence; to access journals, systematic reviews and guidelines; to interact with organizations promoting EBDM; and to tailor evidence to individual cases. However, thinking that all barriers to the practice of EBDM could be solved by fancy information technology is naive. Barriers related to the generation, interpretation, integration and use of the evidence demand more complex and perhaps unfeasible solutions, as overcoming them will require substantial changes in the structure of the health system, in the politics of science and in the way in which humans think and behave.