Abstract:
A technique of controlling access by a client entity to a service in a communications network. Processing modules are interconnected in the network in order to supply the service to the client entity. A processing module implements an individual function of a chain of individual functions associated with the service. The access method includes the following steps implemented by an access control device associated with an access node giving access to the service, the device being referred to as a main device: receiving a chain of processing modules from the access node; sending, to a secondary access control device associated with a processing module of the chain, a request to access the processing module under consideration, the request including an access token negotiated between the main device and the client entity; receiving a response to the access request from the secondary device; and notifying the access node of the response.
Abstract:
A method of transmitting an image portion, in a coding phase, comprises: analyzing a coding context; adapting a parameter of a group of prediction functions that can be used for coding; forming a first predicted descriptor using a selected prediction function; and determining and transmitting a residue (ε) between the first predicted descriptor and the current descriptor. The method further includes a decoding phase comprising: analyzing a decoding context; adapting a parameter of a group of prediction functions that can be used for decoding; forming a second predicted descriptor (P*) using a selected prediction function; and combining the second predicted descriptor and the received residue to deliver a decoded version of the current descriptor (V*).
Abstract:
The invention concerns a method and a system for sound spatialization of a first set of not less than one of the audio channels encoded on of a number of frequency subbands (SBk) and decoded in a transformed domain (Fl, C, Fr, Sr, SI, Ife) into a second set of not less than two (Bl, Br) sound channels in the time domain, from modelling filters converted into a gain and a delay applicable in the transformed domain involving: filtering (A) through equalization, subband delay of the signal by applying at least one gain and one delay to generate from each of said encoded channels an equalized and delayed component; adding (B) a subset of equalized and delayed signals to create a number of filtered signals corresponding to not less than two; synthesizing (C) each of said filtered signals to obtain the second set of not less than two reproduction sound channels (Bl, Br) in the time domain.
Abstract:
A method of determining a spatial coding mode for audio data sent by a sender entity (20) to a receiver terminal (10) adapted to receive said audio data in one or more sound reproduction formats. The method comprises the steps of the receiver terminal (10) indicating (1) to the sender entity (20) said reproduction format(s) in a given order of preference and the sender entity (20) determining a mode of spatial coding of the audio data compatible with a reproduction format taken in the order of preference and indicating (2) said reproduction format to the receiver terminal (10). Application to Voice over IP services.
Abstract:
An authentication method of a prover device by a verifier device using cryptographic coupons is provided, where a coupon includes a pseudo-random number ri, where i is an index for labeling the coupon, and a reduced-coupon xi such that xi=ƒ(ri), where ƒ is a predetermined one-way function, the method including the following steps: the verifier device sends a challenge consisting of a random value c to the prover device; the prover device sends to the verifier device a response y calculated by using the pseudo-random number ri, the challenge c, and a secret key s belonging to the prover device; and the verifier device checks the validity of the response y based on the challenge c, the reduced-coupon xi corresponding to the pseudo-random number ri, and a public key V corresponding to the secret key s, the reduced-coupon xi being received by the verifier device from a source external to the prover device.
Abstract:
An electronic device includes a display screen; and a graphical user interface displayed on the screen and including: a graphical object automatically movable, in accordance with a predefined movement, along at least part of the screen, wherein the automatic movement of the graphical object is triggered in response to a user input; the predefined movement being such that the graphical object is translated in a first direction from a first region of the screen to a second region of the screen. Movement from the first region to the second region indicates a user command being validated. The device further includes a sensor configured to detect the movement of the graphical object from the first region to the second region; and an application processor configured to execute the user command in response to detection of the movement of the graphical object from the first region to the second region.
Abstract:
A method to provide a user interface, the method may be controlled by one or more controllers and may include one or more acts of obtaining image information from a sequence of images of a user; analyzing the image information to recognize the user; recognizing first and second reference objects at least one of which corresponding with respective body parts of the user from the image information; determining whether a first reference object has been placed over or is within a threshold scaled distance of a second reference object; calculating an interaction time between the first reference object and the second reference object when it is determined that the first reference object has been placed over or is within the threshold scaled distance of the second reference object; comparing the interaction time with a threshold reference time; and performing an action in accordance with results of the comparison.
Abstract:
A method is provided for managing connections in an optical access network. Also provided are a corresponding platform, exchange, network and computer software product. The method manages connections of a plurality of user modules to a plurality of transmission modules of an exchange in an optical access network. The management method includes a dynamic re-arrangement of the connection of at least one of the user modules to at least one of the transmission modules according to at least one predetermined optimization criterion.
Abstract:
A method of implementing a block cipher algorithm by a device storing a fixed initialization datum includes determining, before execution of a first iteration of the algorithm in the course of a session, a modified initialization datum by way of a determined function supplied as input with the fixed initialization datum and a state value specific to the session. The state value may be stored in the device. The modified initialization datum may be used to implement the first iteration of the algorithm.
Abstract:
The invention relates to a method of tracking the position of the bust of a user on the basis of a video image stream, said bus comprising the user's torso and head, the method comprising the determination of the position of the torso on a first image, in which method a virtual reference frame is associated with the torso on said first image, and in which method, for a second image, a new position of the virtual reference frame is determined on said second image, and, a relative position of the head with respect to said new position of the virtual reference frame is measured by comparison with the position of the virtual reference frame on said first image, so as to determine independently the movements of the head and the torso.