Abstract:
A system for data exchange in a multimedia terminal, said terminal comprising native applications (2) executable directly by the terminal and local applications (4) and also remote applications (6) executable through Internet browser software (8). This system comprises a module (18) for detecting the operation of applications (4, 6) that are executable through Internet browser software, a downlink interface (10A) for data exchange between the applications (4, 6) that are executable through Internet browser software and the native applications and an uplink interface (10B) for data exchange between the native applications and the local applications, said detecting module and said downlink and uplink interfaces being adapted for exchanging data.
Abstract:
The invention relates to method for managing a set of widgets displayed on the graphical user interface (GUI) of a device, said method comprising the acts of receiving contextual data from the device, querying with the received contextual data a repository of widget configurations for the set of widgets, said widgets configurations being described in said repository as functions of the possible contextual data values, displaying the set of widgets using the configuration that match the received contextual data.
Abstract:
A method of managing alerts issued by intrusion detection sensors (11a, 11b, 11c) of an information security system (1) including an alert management system (13), each alert being defined by an alert identifier and an alert content. Each of the alerts issued by the intrusion detection sensors (11a, 11b, 11c) is associated with a description including a conjunction of valued attributes belonging to attribute domains. The valued attributes belonging to each attribute domain are organized into a taxonomic structure defining generalization relationships between said valued attributes, the plurality of attribute domains thus forming a plurality of taxonomic structures. The description of each of said alerts is completed with sets of values induced by the taxonomic structures on the basis of the valued attributes of said alerts to form complete alerts. The complete alerts are stored in a logic file system (21) to enable them to be consulted.
Abstract:
A method of comparison between pieces of information characterizing reference values and pieces of information characterizing current values of sound-reproducing systems of a system of (n) microphones mi and (p) speakers hpj for the control of said sound-reproducing systems characterized in that: A: for each speaker hpj, at least one sound signal S is sent on the speaker hpj, for each microphone mi, a piece of information hpjmi is retrieved, this piece of information characterizing the sound-reproducing system comprising the speaker hpj and the microphone mi, B: a reference matrix Qr is saved, this reference matrix being constituted by all the pieces of reference information hpjmi obtained following the sending of the sound signal S, C: as soon as a comparison is to be made, the step A is run with a sound signal S′ to obtain current information on a matrix Q, D: the matrices Q and Qr are compared.
Abstract:
Method of routing in a telecommunications network an SIP message intended to be routed through intermediate entities constituting nodes of a signaling path. According to the invention, said method comprises a step of bypassing an intermediate entity able to be bypassed if unavailable. Application to the IMS architecture.
Abstract:
A method of scheduling for a given transmission time slot, time being divided into time slots for time division multiplex transmission to a plurality of terminals, said method comprising: a. a step of establishing a first list of active terminals, having one or more data packets waiting to be sent, the terminals being connected to one or more of the transmitting stations of a group of transmitting stations; b. a test step of verifying if the first list contains one or more terminals; c. if the test is positive, a step of selecting a terminal from the first list; d. a step of adding the selected terminal to a second list; i. a step of determining the transmitting station or stations to which the selected terminal is connected; j. if the first list contains one or more other terminals also connected to the or to one or more of the transmitting stations determined in step e, a step of deleting the other terminal(s) from the first list; the steps b to f being repeated until the first list is empty, and, when the first list is empty, there follows a step of commanding transmission during the given time slot, to the terminal or terminals from the second list, of the respective data packet or packets waiting to be sent, and, if a terminal from the second list is connected to at least two transmitting stations, the step of commanding transmission commands transmission of the data packet waiting to be sent for this terminal from the two transmitting stations.
Abstract:
A method of controlling movement of a line of sight of a video camera mounted on a mobile videoconferencing terminal includes: a) a step (72) of using at least two microphones spaced apart from each other in three dimensions and attached to the mobile terminal to pick up a sound uttered by a user of the mobile terminal, b) a step (74) of responding to the signals from the microphones to establish a direction in which the mouth of the user is located, and c) a step (76) of controlling movement of the line of sight as a function of the direction established during step b).
Abstract:
A method of converting a voice signal spoken by a source speaker into a converted voice signal having acoustic characteristics that resemble those of a target speaker. The method includes the following steps: determining (1) at least one function for the transformation of the acoustic characteristics of the source speaker into acoustic characteristics similar to those of the target speaker; and transforming the acoustic characteristics of the voice signal to be converted using the at least one transformation function. The method is characterized in that: (i) the aforementioned transformation function-determining step (1) consists in determining (1) a function for the joint transformation of characteristics relating to the spectral envelope and characteristics relating to the fundamental frequency of the source speaker; and (ii) the transformation includes the application of the joint transformation function.
Abstract:
The invention relates to the processing of a signal that is compression encoded (COD) according to a predetermined encoding type applying a quantification operation (Q) and then decoded (DEC) so that the quantification noise is present in the decoded signal (S*). The signal processing of the invention comprises applying a quantification noise reduction (TBQ) to the decoded signal (S), preferably in the following manner: first obtaining information (INF) on the type of compression encoding, selecting a model for the reduction of the quantification noise adapted to said information by estimating the quantification noise (BQ) that the encoding may have generated; and applying to the decoded signal (S*) a processing for reducing the quantification noise (FIL) according to the selected model.
Abstract:
The cryptographic method is used in transactions for which a first entity generates, by use of a private RSA key, a proof verifiable by a second entity by use of a public RSA key associated with said private key. The public key includes an exponent and a modulus. The first entity generates a first element of proof by a calculation that can be performed independently of the transaction, and a second element of proof related to the first element of proof and which depends on a common number shared by the first and the second entities specifically for the transaction. The second entity verifies that the first element of proof is related, modulo the modulus of the public key, to a power of a generic number, with an exponent equal to a linear combination of the common number and of a product of the exponent of the public key by the second element of proof.