摘要:
A network-based device creates composite video streams containing video images of users for display on video conferencing screens. Video image streams are cascaded through a series of quad boxes to create combined video streams and ultimately the composite video stream. The composite video stream produces a display grid comprised of a plurality of image boxes. The device uses quad box input port mapping to direct a specific video image stream to a specific image box by controlling the cascade path of each video image stream through the quad boxes in creating the composite video stream. A user interface permits a user to selectively determine the layout of user images on the video conferencing screen. Screen layout extends to size of each user image being incrementally controlled and location of each user image being selectively determined depending upon the size and the number of the various user images. By controlling size and location of each user image, the screen display area available for other uses, such as the display of applications programs, is increased.
摘要:
The invention described herein provides a method and system for foiling a keylogger by creating a custom keyboard driver and passing the keystrokes directly to the browser in an encrypted format. The browser (which is used to access the Internet) has a component that decrypts the keystroke before it is sent to the website. Thus the present invention enables the user to go to any website and enter sensitive information (passwords, credit card numbers, etc.) without the keystrokes being intercepted by Keyloggers. In general terms, the invention described herein provides a method and system for (1) modifying the keyboard driver, (2) encrypting the keystrokes between the keyboard driver and the browser, and (3) notifying the user if the invention has been compromised.