Abstract: A bridge circuit 10 is provided between first data port A1, A2 and second data port B1, B2. The bridge circuit comprises a first transceiver stage 40 comprising at least one input buffer 11, 14 and at least one tri-state output buffer 12, 13 linked to the first data port, a second transceiver stage 50 comprising at least one input buffer 21, 24 and at least one tri-state output buffer 12, 13 linked to the second data port, a first detection circuit 31 for detecting the arrival of a packet by the first data port, a second detection circuit 37 for detecting the arrival of a packet by the second data port. A selection circuitry 34, 35 enables the output of tri-state output buffer of the first or of the second transceiver stage depending of the detection made by the first and second detection circuits.
Type:
Application
Filed:
December 21, 2007
Publication date:
November 4, 2010
Applicants:
GEMALTO SA, INVIA SAS
Inventors:
Robert Leydier, Alain Pomet, Benjamin Duval
Abstract: An automated computer-implemented method for reorienting ECT myocardial perfusion images of a heart LV. The method includes receiving variously oriented tomographic images; receiving LV long-axis, LV center and LV axial limits based on the images; receiving the endocardial surface of the LV based on the images; determining a reorientation slice range based on the center and axial limits of the LV; receiving slices (N) within the reorientation slice range; for each slice, determining a center coordinate x[i], y[i] based on the endocardial surface and the area of the slice within a reorientation slice range coordinate system; determining translation ?xi, ?yi and rotation ?x, ?y values based on center coordinates x[i=1 to N], y[i=1 to N] to reorient the LV long axis to the z-axis and its origin of a reference Cartesian coordinate system; and automatically reorienting and realigning the tomographic images based on the translation and rotation values.
Abstract: A method for real-time authentication or authorization of a user (1) of a secured system (3) is based on using two authentication channels and an authentication device (4) from which the secured system can request authentication or authorization (6) over a secured information network connection (6, 9). One of the authentication channels is a telephone network (8), to which the authentication device (4) is connected. A user logging into the secured system (3) over the other channel (6) of the authentication channels must make a call to the authentication device over the telephone network by his or her telephone (2). The authentication device verifies that a call has been received from a telephone number of the user's telephone, and issues a positive verification response to the secured system. Upon receiving a positive response, the secured system provides a requested service through the other channel.
Type:
Grant
Filed:
December 17, 2002
Date of Patent:
August 24, 2004
Assignee:
ICL Invia Oyj
Inventors:
Mika Leivo, Mika Honkanen, Juha-Matti Linkkonen