摘要:
One or more participants in a communication are authenticated using an authentication metric such as a face print or voice print. A single telecommunication address (or one for each participant) that is not associated with a communication device and is associated with at least one of the participants is determined. The telecommunication address (or addresses) is sent during the initiation of a communication session.Other embodiments provide for sending a single associated telecommunications address, individual identifiers of each of the participants, and a communication device name to better identify exactly who is calling. The system can also detect when an additional participant has joined the communication session and when a participant leaves the communication session.
摘要:
Fingerprint portions of two or more different fingers are detected on a detection surface, such as an optical surface, a touch pad, a touchscreen, or the like, and then a further detection made that the person has moved their finger(s), for example, apart, together or relative to one another. The movement can be detected based on identifying the fingerprint portion sliding across the screen. The combination of fingerprint information associated with a corresponding motion is correlatable to one or more actions or triggering events that are used to control one or more electronic devices. Further aspects are directed toward utilizing one or more of the techniques herein for a security application. For example, two users, each placing one or more fingers on a touch screen or touch pad, with the fingerprints thereafter being recognized, perform a certain movement with this triggering the unlocking, or locking, of an object.
摘要:
A method for controlling a multi-media presentation is provided. The method includes displaying an event structure related to an event on a graphical user interface, getting a plurality of event items associated with the event, and displaying the plurality of event items associated with the event structure on the graphical user interface. Responsive to an event trigger, the event is started. The method further includes receiving a selection of a first event item from the plurality of event items, performing a first action related to the first event item, and sending an output of the first action to a display device.
摘要:
Disclosed is a simplified interactive solution for providing access to back-end services. A communication is established from a communication device to a processing system. The processing system receives a picture from the communication device. The user is presented with tasks (services to perform on the picture) on an IVR menu in an Interactive Voice Response (IVR) system. The user responds by choosing a task to perform on the picture. The task is then performed on the picture. Some of the tasks that can be performed are to generate postcards/greeting cards based on pictures. These can be combined with other services such as photo processing services/delivery services to provide a rich set of services to the user.
摘要:
A method and apparatus for testing the implementation of an object in an object management system. The method and apparatus according to this invention automatically identify at least one attribute of a selected object, automatically generate one or more test signals as a function of the identified attribute, automatically analyze the response returned in response to the communicated test signal and report any detected errors. The method and apparatus of this invention help ensure that a developer of object management software has implemented the objects correctly.
摘要:
Fingerprint portions of two or more different fingers are detected on a detection surface, such as an optical surface, a touch pad, a touchscreen, or the like, and then a further detection made that the person has moved their finger(s), for example, apart, together or relative to one another. The movement can be detected based on identifying the fingerprint portion sliding across the screen. The combination of fingerprint information associated with a corresponding motion is correlatable to one or more actions or triggering events that are used to control one or more electronic devices. Further aspects are directed toward utilizing one or more of the techniques herein for a security application. For example, two users, each placing one or more fingers on a touch screen or touch pad, with the fingerprints thereafter being recognized, perform a certain movement with this triggering the unlocking, or locking, of an object.
摘要:
The system gets a request to add a communication node to an existing peer-to-peer communication session between two communication nodes. The communication node is added to the existing peer-to-peer communication session. The communication nodes in the existing peer-to-peer communication have not previously defined a mixing node. The communication nodes in the existing peer-to-peer communication session exchange a mixing score. A mixing node is determined based on the exchanged mixing score. Additional systems are defined which determine a mixing node when two peer-to-peer communication sessions are joined into a combined peer-to-peer communication session.
摘要:
A speech characteristic, such as a volume level of a call participant is derived; the derived speech characteristic is associated with an identifier, such as a caller ID number. The speech characteristic and identifier are stored in a call participant profile. An adjustment of volume level of an audio signal of the call participant is made based on the measured speech characteristic and the identifier in the call participant profile.In a second embodiment, the system and method can be further adapted to identify a speech characteristic of a participant(s) in a conference call. A determination is made when the participant of the conference call is speaking during the conference call. An adjustment is made to a mixed audio signal of the conference call based on the speech characteristic of the participant in the conference call.
摘要:
A text object(s) such as a document containing a plurality of text items (e.g., chapters, paragraphs, etc.) is used to generate a search term. At least one, but not all, of the text items in the text object are selected based on a profile. The selected text item(s) are parsed to generate one or more search terms. This allows a user to drag-and-drop a graphical text object into a search engine icon to automatically perform a search based on the profile. Alternatively, a non-text object (e.g., an image) containing any identifiable item is used to generate the search term. Based on the profile, the item is parsed to generate a text representation of the item. The text representation of the item is used to generate one or more search terms.
摘要:
The system generates a first data stream which represents a data signal. The first data stream is encoded via a first encoding technique. The first data stream comprises one or more packets with a duration and timestamp. The data signal is encoded into a second data stream using a different encoding technique with a corresponding packet in the second data stream. A packet in the second data stream has the same duration and timestamp as the corresponding packet in the first data stream.The first data stream is sent on a first network. The second data stream is sent on a second network. The first and second data streams are received. A missing/delayed packet in the first data stream is detected. The data signal is regenerated using the first data stream and the packet from the second data stream that corresponds to the missing/delayed packet in the first data stream.