Abstract:
A passive optical network is provided, which includes an optical central office connected to a line termination device by a branch of the network including a passive amplification medium. The central office is adapted to send/receive a first data optical signal and has a first amplifier for sending a second amplification optical signal. The second signal exciting the amplification medium to amplify the optical power of an optical signal. The line termination device is adapted to receive the first optical signal, modulate the second amplification optical signal; and inject the modulated second signal into the network.
Abstract:
A method is provided for sharing data between a plurality of nodes in a communication network. The communication network includes a first sharing router and a second sharing router. The first sharing router and second sharing router each have a memory, the memory including a record table for storing at least one record, wherein each record includes at least a reference describing the data to share and, at least one of the data to share or the address of at least a data node associated with the data to share, so that a collecting node may further collect the data.
Abstract:
The invention relates to a method for coding a sequence of video images comprising a cutting into zones of at least one current image of the sequence, characterized in that, for the coding of at least one target zone of said at least one current image, it comprises the steps of: determination (E2) of a set of candidate zones in previously coded and then decoded parts of images of the sequence, minimizing a prediction error calculated over the neighborhood of the target zone, formation (E3) of a set of groups of candidate zones in said set of candidate zones, as a function of a criterion of similarity between the candidate zones, identification (E6) of a best group in said set of groups, minimizing a reconstruction error with respect to the target zone, determination (E6) of an indication (n) representative of said identified best group; and coding (E7) of said indication (n).
Abstract:
A method of automatically controlling fraud in an electronic transaction system. When a user initiates a session in the electronic transaction system, an element is generated and stored in a database in association with information identifying the user. Each time during the session the user commands the execution of an operation, an equation is determined that is satisfied by the element stored in the database. When a sufficient given number of operations has been effected, the system of equations consisting of the equations determined as above is solved to deduce the element. By consulting the database, the corresponding information identifying the user is deduced from the element obtained in this way.
Abstract:
An electronic entity is adapted for a mobile terminal comprising a subscriber identity card. The electronic entity comprises a near-field communication component, an antenna for the near-field communication component and a wire interface that links the near-field communication component to the subscriber identity card, the near-field communication component being positioned at the level of the antenna.
Abstract:
Method of configuring a terminal (10a) by means of a device external to said terminal (50a) able to communicate with said terminal and comprising data storage means, the initialization of said terminal triggering at least: a step for executing a boot program of an operating system of said terminal, said boot program being stored in a first memory area of said storage means, a step for verifying, by the boot program, a first digital signature of a first file stored in a second memory area of said storage means, said first file comprising a kernel of an operating system of said terminal, a step for starting up said kernel, said startup step being intended to be triggered only if said digital signature is valid.
Abstract:
The invention relates to a resource allocation method. According to the invention, databases of computer objects are produced solely with properties intrinsic to the physical objects. Data filters are defined in order to sort the different intrinsic properties and to divide same into object classes. Allocation matrices are then used to match the resources with the object classes. During the handling of a process, the allocation method is implemented in order to determine a resource. A database is queried in order to obtain intrinsic information. Subsequently, the intrinsic information passes through a data filter in order to determine a membership class. One or more resources are then determined from the membership class with an allocation matrix. The inventive method is performed with the aid of a computer program. The invention also relates to a processing system which is designed to implement said method.
Abstract:
A method and apparatus are provided for encoding an image sequence. The method includes the following steps, for at least one group of blocks of an image: determining, for each block, at least one parameter characteristic of said block; forming at least one cluster including the blocks having at least one similar characteristic parameter; encoding the blocks of said cluster, the similar characteristic parameter(s) associated with said cluster being encoded only once; encoding the blocks that do not belong to any cluster, the characteristic parameter(s) associated with each of said blocks not being encoded; generating a data stream; and inserting into said stream, at least one piece of information on the partitioning of the group(s), in order to identify the outer block(s) within a group.
Abstract:
A method and apparatus are provided for managing authentication of a user of a telecommunications network of an operator. The method includes the following steps: on receipt of a request for access to a service provided by the operator of this network by the user, issuing a request for identification of an authentication server destined for an authentication location server, the request including at least one identifier of the user; and on receipt of a response comprising an identifier of an authentication server associated with the identifier of the user, issuing a request for authentication of the user at the server identified for the requested service.
Abstract:
A system an method are provided for providing a service, such as telemonitoring, in particular via the Internet. The system includes a terminal device of a communication network having elements for establishing a connection with a service provider device through at least the communication network, and an application server able to receive a service request from the service provider device on the connection. Thus, the terminal device can make itself accessible to a service provider device as soon as it is put into service. Furthermore, the fact that the terminal device is at the initiative of the connection for this service secures access to the data of the terminal device relating to this service.