Abstract:
The method comprises the following steps: applying a watermarking function to motion vectors calculated by estimation of movement between images of a video signal; and generating the watermarked video signal by compensating movement with the aid of the watermarked motion vectors. The watermarking function is applied by: marking the coordinates of the selected motion vector in a space, certain portions of this space constituting a first zone and the other portions of this space constituting a second zone complementary to the first; assigning a binary value to each of the two zones; and where necessary, modifying the coordinates of the selected motion vector so that it is in the zone whose binary value corresponds to a bit of a marking key associated with the selected motion vector.
Abstract:
A technique for correcting the voice spectral deformations introduced by a communication network. Prior to the operation of equalisation of the voice signal of a speaker, the constitution of classes of speakers is communicated, with one voice reference per class. Then, for a given speaker, the classification of this speaker is communicated, that is to say his allocation to a class from predefined classification criteria in order to make a voice reference which is closest to his own correspond to him. Then, for that given speaker, communicating the equalisation of the digitised signal of the voice of the speaker carried out with, as a reference spectrum, the voice reference of the class to which the speaker has been allocated. This technique applies to the correction of the timbre of the voice in switched telephone networks, in ISDN networks and in mobile networks.
Abstract:
To avoid recourse to a certification authority and to keep a trace of delegation to a delegate by a titleholder, a terminal of the titleholder draws up a second electronic certificate different from the normal certificate of the delegate. The second certificate includes at least a delegation attribute and a signature of the data in the second certificate by means of a private key of the titleholder. The titleholder behaves like a certification authority in respect of the second certificate, which is used for cryptographic actions by the delegate in the name of the titleholder.
Abstract:
A method of propagating invocation contexts through a distributed object system that includes an application management API interface and wherein each object is associated with an interceptor and with a manager of the context of an incoming request received by the interceptor when the object is invoked. A thread manager is provided for the interceptor for the purpose, firstly, of establishing an association between a thread of an object directly consecutive to an incoming request invoking the object and the context of the incoming request as identified by the context manager and, secondly, of recovering the context from the thread manager and associating it with the outgoing request from the object. A method is added to the application management API interface enabling it to recover the current context from the thread manager and to associate it with any thread of the object indirectly consecutive to the incoming request.
Abstract:
Anthropomorphic mobile telecommunication apparatus The mobile telecommunication apparatus (1) comprises a microphone (4), a loudspeaker (3), a transmitter/receiver (7), a control circuit (8) with a memory (9) and a control interface (5, 6) with a display (2). The mobile telecommunication apparatus (1) comprises in memory a collection of so-called personae (10) containing control and viewing parameters associated with each persona, a personae editor (11) designed for read/write access to the parameters of the said collection of personae, and an operating system (12) designed to be executed right from startup by the control circuit (8) in such a way as to drive the personae editor (11) so as to view a so-called main persona on the display (2).
Abstract:
An interface device and method for use with an intelligent content-broadcast network. User profile information is collected and stored in a memory device assessable to a secondary content processor. Secondary content is information, such as advertisements from a television network source, that is available for insertion into the primary broadcast stream as appropriate. When a particular user is identified as viewing a primary-content program, a processor associates the user with a stored profile and uses the profile information to determine what, if any, secondary content should be inserted and thus presented to the user as if it had been a part of the broadcast stream. The portion of the primary broadcast stream where secondary content may be inserted is indicated by embedded cues.
Abstract:
A shop management method and a platform for performing the method are provided to assist shopkeepers who have an inventory of products being offered for sale. A management space is assigned for each shopkeeper on the management platform which is remotely located from the shop and is accessible via a network, such as the Internet. Access to the shopkeeper's management space is controlled by authorized list. Certain pre-arranged management tools for this shop are made available to the shopkeeper in the corresponding assigned management space.
Abstract:
Information system comprising an assembly of at least one information station (1001, . . . , 100n) which possesses data storage means and means of interaction with at least one user, by exchange of information such as sounds and/or pictures and/or alphanumeric data so as to provide the user with information extracted from the said storage means. Furthermore, the information system comprises a videophone call center (200) connected to the said station (100i) by means of a high bit rate communication network (300) and the said station possesses means, actuatable by the user, for establishing a videophone communication with a terminal so as to enter into communication with an operator holding the information sought by the user.
Abstract:
A system of authorizing access to a resource including a processor obtaining sensor information related to at least two users from one or more sensors, the sensor information including one or more of image information and proximity information of each of the at least two users. Further, an act of identifying current gestures is performed for each of the at least two users in accordance with the sensor information. The current gestures may be compared with pre-stored gesture information related to predetermined gestures and an order of the predetermined gestures. Further, access to the resource may be authorized when it is determined that the current gestures are in accordance with the predetermined gestures and the order of the predetermined gestures.
Abstract:
A transmission process and device are provided for transmitting an enriched audio or audiovisual message. The process includes converting enriching information configured to enrich the content of an initial audio or audiovisual message and processing information linked to the enriching information into at least one multimedia insertion message, inserting the multimedia insertion message at least into the audio or visual content of the initial message so as to create an enriched message, and transmitting the enriched message via a communications system from the transmission device to at least one receiving device.