摘要:
A method and apparatus for efficient image encoding in a predictive coding or other error image based image compression scheme, a pseudo-fixed length code is employed to convert certain calculated error values into codewords. The code is pseudo-fixed length since the length of codewords is fixed for a particular range of values and then increased for the next range. The length of codewords is not needed in decoding by choosing prefixes that uniquely distinguish codewords when packed together. As a result, efficient and quick image encoding/decoding is made possible.
摘要:
A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
摘要:
A software entity on a host device attempting to access protected content in a secure memory device must be authenticated using a challenge/response authentication mechanism before the secure file system can be accessed. A file system filter determines whether requested content is protected. If the content is protected, the file system filter provides a challenge to the software entity and generates a file system filter response using the same challenge. The software entity must then send a software entity response using the challenge to the file system filter. If the file system filter determines that the software entity response matches the file system filter response, the software entity is allowed to access the protected content through a secure file system installed on the host device for the memory device.
摘要:
In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.
摘要:
The embodiments described herein generally relate to a method and host device for enforcing a rule associated with a media file. In one embodiment, an observer module determines that a media player is attempting to play a media file. Before allowing the media player to play the media file, the observer module determines if the media file is associated with a rule that specifies an action to be taken if a playback event is detected. If it is determined that the media file is associated with a rule, the observer module observes playback of the media file to detect if the playback event specified in the rule occurred and takes the action specified in the rule if the playback event is detected.
摘要:
A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.
摘要:
Methods for transmitting application specific or extended commands between a host and a memory card are disclosed. Commands for an extended card protocol are embedded in messages, along with a marker, in the data or command portion of a base card transmission protocol that is used to communicate between the host and the memory card. This allows for the transmission of application specific commands that lack a corresponding command in the base card protocol. The method can be implemented on the host side at the device driver level or the file level. In order to implement a read command in the extended card protocol, a write command in the base card protocol with an encapsulated read command in the extended protocol is first sent to a logical address, followed by a read command to the same logical address. Message set identifiers associate embedded commands and data received in separate transmissions.
摘要:
A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a command and passed to a host file system process. The packet, now associated with a second command, is received from the host file system process. The encryption instruction and the payload of data are extracted from the packet. At least a portion of the payload of data is encrypted based on the encryption instruction. A method for decrypting data may receive a packet and generate a decryption instruction. At least a portion of the packet is decrypted using at least the decryption instruction. The second packet comprising the decrypted packet is passed to a host file system process. A third packet comprising the decrypted packet is received from the host file system process. The decrypted packet is extracted from the third packet.
摘要:
A system and process for improving the appearance of improperly colored and/or improperly exposed images is presented. This involves the use of two novel techniques—namely an automatic color correction technique and an automatic exposure correction technique. The automatic color correction technique takes information from within an image to determine true color characteristics, and improves the color in improperly colored pixels. The automatic exposure correction technique measures the average intensity of all of the pixels and adjusts the entire image pixel by pixel to compensate for over or under exposure. These techniques are stand alone in that each can be applied to an image exclusive of the other, or they can both be applied in any order desired.
摘要:
Techniques and tools for analyzing and adjusting the exposure of digital images are described. For example, a computer processes a digital image by analyzing exposure data, assigning an image classification (e.g., StretchNeeded, UnderExposed, OverExposed, or Normal) based on the analysis, and selecting an exposure compensation technique (e.g., histogram stretch, positive gamma curve, negative gamma curve, or no adjustment) based on the image classification. The exposure data can be luminance values for pixels in the digital image represented in a histogram. The computer can produce transform data comprising a transformation of the exposure data according to the selected exposure compensation technique. The computer can store transform data in a look-up table and can store the look-up table in the digital image file. The described techniques and tools can be implemented as a feature of an operating system environment and can be activated responsive to user action via a user interface.