摘要:
A security system and methodology are provided employing a process that determines whether to use an image and/or other inputs received from at least one remote input node. In one illustrative embodiment, the invention comprises a system and method for using image input in conjunction with wireless transmission to increase personal safety.
摘要:
A method of transferring data includes reception of a message from a first mobile device operated by a user, storage of the message according to a location of the first mobile device, reception of an indication that a second mobile device operated by a second user is located proximate to the location, and transmission of the message to the second mobile device.
摘要:
Systems and methods are provided to facilitate a distribution of information. According to one embodiment, vehicle control information is determined, the vehicle control information being dependent on time in formation, operator information, and/or vehicle information. For example, an intersection control signal may be determined. The vehicle control information is then transmitted to an automobile device, which in turn arranges for the vehicle control information to be provided to an operator. For example, a graphical representation of an intersection control signal may be displayed on an automobile's windshield.
摘要:
A simplified TV viewer response system coupled to a telephone system enables a viewer/subscriber to respond to television displays by dialing a special code less than six digits. The code is routed to an enhanced services server. The server captures the dial string including the caller ID, checks the caller ID against a subscriber/viewer profile and maps the caller ID to the cable company providing service to the viewer/subscriber. The server delivers the response to the cable television company which processes the response according to the selected items or choices in the TV screen. Several special dialing codes of limited digits expedite viewer/subscriber selections. Each code includes a special character to route the dialing string to the server. The system provides sound recognition of viewer/subscriber selections.
摘要:
A multi-media search and indexing system for automatic selection of scenes or sounds recorded in media for replay in other context by analyzing the media for a set of frequency ranges of interest for replay. The media is analyzed to select desired frequency ranges of interest within the media, the selected frequency ranges being indicative of a scene or sound of interest. The granularity or length of the selected frequency ranges is selected for analysis. A number of analysis intervals are determined in the selected frequency ranges. The media is filtered for the selected frequency ranges and the audio level is measured for each interval. An audio clip level is established for each frequency range as indicative of a scene or sound of interest. The interval frequency range and audio level are recorded for subsequent replay.
摘要:
Secure communication may be conducted between two or more parties over a network, e.g the Internet without prior security arrangements among the parties or agreed to encryption/decryption software. A sending party is connected to a data network through a computer and has access to a communications network, e.g. a public switched telephone network. The sender prepares a file designated, e.g. “X” containing confidential information for secure transmission over the Internet or the like to one or more receivers. In one embodiment, the sender downloads encryption/decryption or “crypto” software stored at a location on the Internet e.g. location “U” in a Uniform Resource Locator (URL). The “crypto” software is written in executable code or an interpretive language such as JAVA. The sender selects a key “K” and encrypts the plain text file “X” into cipher text. At some point the communication network is accessed and the receiver(s) is notified of the URL U where the “crypto” software is located and the key “K” for decrypting the file “X”. Afterwards, the receiver(s) accesses the URL U using his computer and a web browser. The crypto software is pointed to in Hyper Text Mark Up Language (HTML) and displayed on the receiver screen(s). The HTML page requests the “Key” which the receiver enters. The file “X” is downloaded and decrypted using the key “K” and displayed at the receiver screen(s).
摘要:
A multimedia search and indexing system automatically selects scenes or events of interest from any media, i.e., video, film, sound for replay, in whole or in part, in other contexts. The entire audio track of a recorded event in video, film, sound, etc., is analyzed to determine audio levels within a set of frequency ranges of interest. Audio clip levels within the selected frequency ranges are chosen as audio cues representative of events of interest in the track. The selection criteria are applied to the audio track of the recorded event. An Edit Decision List (EDL) is generated from the analysis of the audio track. The list is representative of scenes or sounds of interest as clips for reuse. The clips are reviewed and accepted or rejected for reuse. Once selected, the clips are edited using industry standard audio and video editing techniques.
摘要:
A method for generating an assent indication in a document approval and review function can include loading a document for editing in a document editor and determining a set of authors for the document. The method also can include modifying a title of the document to include an identity of at least one of the authors in the set. Finally, the method can include changing a visual appearance in the title of an identity of the assenting author responsive to one of the authors in the set assenting to a publication of the document.
摘要:
A method for providing configurable access to media in a media-on-demand system also can include delivering the media to a first client device in a format compatible with the first client device; interrupting the delivery of the media; recording a bookmark specifying a position in the media where the interruption occurred; and resuming delivery of the media to a second client device, the resumed delivery beginning at a position in the media specified by the recorded bookmark. The method further can include identifying device properties for each of the first and second client devices; delivering the media to the first client device in a format compatible with the identified device properties for the first client device; and, delivering the media to the second client device in a format compatible with the identified device properties for the second client device.
摘要:
Detecting click fraud that includes a processing device that receives data related to a cursor movement towards an advertisement displayed on a web page. The processing device analyzes the cursor movement data and determines a confidence level useable in the determination of click fraud, the confidence level responsive to the analysis of the cursor movement. The received data includes data that the cursor on the web page has transited at least one pixel cluster on the web page prior to a clicking the advertisement. In one embodiment, a click fraud is detected when the click occurred without the cursor crossing a pixel cluster, and no click fraud occurring when the click occurred after the cursor crossed a pixel cluster.