Abstract:
In one embodiment, the trajectory of one or more electrons is controlled in a field emission device. In another embodiment, the field emission device is configured analogously to a klystron. In another embodiment, the field emission device is configured with electrical circuitry selected to control the input and output of the device.
Abstract:
A 3D-display system alternates between directing light representing a left-eye view of a 3D image to a viewer's left eye and directing light representing a right-eye view of a 3D image to a viewer's right eye. To direct the light towards the viewer's eyes, the system receives eye-location data relative to a display device from an eye-tracking system and uses light deflectors, such as acousto-optic, electro-optic, and passive optical deflectors, to aim the light in a particular direction.
Abstract:
A system for detecting and responding to an intruding camera. The system includes an electronic media display device having a screen configured to display content, a sensor, and a processing circuit. The processing circuit is configured to obtain information from the sensor, analyze the information to determine a presence of a camera, and edit any displayed content in response to the presence of the camera.
Abstract:
In one embodiment, the trajectory of one or more electrons is controlled in a field emission device. In another embodiment, the field emission device is configured analogously to a klystron. In another embodiment, the field emission device is configured with electrical circuitry selected to control the input and output of the device.
Abstract:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.