Abstract:
A speech analysis module compares a subject text to the voice of a subject person reciting the text, and generates a personal voice library of the subject's voice. The library includes audio files of actual words spoken by the subject person, as well as morphological, syntactical and grammatical considerations affecting the pronunciation of words and pauses. Words not actually spoken by the subject can be artificially synthesized by an analysis of the subject's speech and pronunciation, and utilizing sounds and portions of words spoken by the subject. Upon request for an audio recording of an object text in the voice of the subject, an integration module retrieves discrete audio files from the personal voice library and artificially generates a voice recording of the object text in the voice of the subject. The generation and transmission of custom audio files can be part of a commercial transaction.
Abstract:
A memory system has a plurality of memory devices and a memory controller coupled to one another in a chain. A packet transmitted through the chain includes a flexible command packet header identifying at least two non-sequential memory devices to be accessed, bypassing interim devices in the chain. The flexible command packet header also allows data to be fragmented in non-sequential memory locations within a memory device, and to be stored non-symmetrically (in different addressable locations among separate memory devices). The flexible command packet header does not have a fixed number of words, but is flexibly configurable to address various numbers of memory devices and various numbers of memory areas within the memory devices.
Abstract:
In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle. Relevant digital information of all components is recorded in a proprietary, highly secure data base at the time of manufacture, and updated for vehicular repairs. Only registered agents may access the data base or submit updates to the federal network. During refueling or re-charging of a vehicle, a digital handshake compares public keys of the vehicular components to the proprietary data base, and confirms the integrity of at least some components by a public-key/private-key challenge and response. If components have been reported stolen, or other irregularities are detected in the vehicle's network of components during the hand shake process, the vehicle is disabled, and a message is automatically transmitted to one or more law enforcement agencies, identifying the vehicle and its location.
Abstract:
A first person narrates a selected written text to generate a reference audio file including one or more parameters are selected from the sounds of the reference audio file, including the duration of a sound, the duration of a pause, the rise and fall of frequency relative to a reference frequency, and/or volume differential between select sounds. A voice profile library contains a phonetic library of sounds spoken by a subject speaker. An integration module generates a preliminary audio file of the selected text in the voice of the subject speaker and then modifies individual sounds by the parameters from the reference file, forming a hybrid audio file. The hybrid audio file retains the tonality of the subject voice, but incorporates the rhythm, cadence and inflections of the reference voice. The reference audio file, and/or the hybrid audio file are licensed or sold as part of a commercial transaction.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle. Relevant digital information of all components is recorded in a proprietary, highly secure data base at the time of manufacture, and updated for vehicular repairs. Only registered agents may access the data base or submit updates to the federal network. During refueling or re-charging of a vehicle, a digital handshake compares public keys of the vehicular components to the proprietary data base, and confirms the integrity of at least some components by a public-key/private-key challenge and response. If components have been reported stolen, or other irregularities are detected in the vehicle's network of components during the hand shake process, the vehicle is disabled, and a message is automatically transmitted to one or more law enforcement agencies, identifying the vehicle and its location.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.
Abstract:
A video network includes public kiosks having digital storage capacity. Centralized inventory control manages the video files stored at individual kiosks or network LANs. A user requests a multimedia file for download, and selects various ancillary files and control features, such as languages, subtitles, control of nudity, etc. The requested file is encrypted according to an encryption key, watermarked, and downloaded from a high-speed port of a public kiosk to a hand-held proprietary high speed memory device of a user. Payment is received at the time of request or at the time of download, and royalties are distributed by the video network to copyright holders. Computer applications or playback devices allow users to store and/or play video files that have been downloaded to a hand-held device while managing and enforcing digital rights of content providers through the watermarking and/or encryption.