摘要:
Methods, portable electronic devices, systems and computer program products are provided for automatically creating a social networking service (SNS) session. The methods include generating at and transmitting from a first device a first audio and/or video fingerprint of an audio and/or video event. The first audio and/or video fingerprint has a first predetermined length (T). A second audio and/or video fingerprint is periodically transmitted to a server from the first device. The second audio and/or video fingerprint has a second predetermined length (t), smaller than the first predetermined length (T), and includes data associated with the audio and/or video event that is later in time than data included in the first audio and/or video fingerprint. The first device is joined to an SNS session, automatically created by the server, responsive to receipts at the server, of a third audio and/or video fingerprint having the first predetermined length (T) from a second device that includes a portion of the first audio and/or video fingerprint or the second audio and/or video fingerprint periodically transmitted from the first device.
摘要:
Methods, portable electronic devices, systems and computer program products are provided for automatically creating a social networking service (SNS) session. The methods include generating at and transmitting from a first device a first audio and/or video fingerprint of an audio and/or video event. The first audio and/or video fingerprint has a first predetermined length (T). A second audio and/or video fingerprint is periodically transmitted to a server from the first device. The second audio and/or video fingerprint has a second predetermined length (t), smaller than the first predetermined length (T), and includes data associated with the audio and/or video event that is later in time than data included in the first audio and/or video fingerprint. The first device is joined to an SNS session, automatically created by the server, responsive to receipts at the server, of a third audio and/or video fingerprint having the first predetermined length (T) from a second device that includes a portion of the first audio and/or video fingerprint or the second audio and/or video fingerprint periodically transmitted from the first device.
摘要:
The present invention concerns devices and methods for control of data transfer in a personal area network. The data transfer being performed by body coupled communication (BCC) and short-range wireless communication between a first portable electronic communication device (10) and a second portable electronic communication device (20, 30). The devices being adapted to be in close proximity to a body of a user and the first portable electronic communication device (10) is configured to initiate and perform execution of predefined actions by means of the method to cooperate with the second portable electronic communication device (20, 30) in a system/personal area network.
摘要:
A system and method for a plurality of electronic equipment located within a short range communication zone to share bandwidth with each other. In one aspect of the invention, an electronic equipment (a requesting electronic equipment) transmits a request for content over a cellular telephone network (e.g., 3G, GPRS, etc.). In addition, the electronic equipment communicates with other electronic equipment through a wireless local area network (WLAN) interface (e.g., Bluetooth, 802.11, etc.) to determine if the other electronic equipment are available to share bandwidth with the requesting electronic equipment. The other electronic transmit the requested content to the master portable communication device through the WLAN interface.
摘要:
A system receives a request to access a secure resource and a verification telephone number from a first device, establishes a secure session with a second device associated with the verification telephone number, requests an authentication mechanism from the second device to verify the secure resource request, verifies the received authentication mechanism if the requested authentication mechanism is received from the second device, and determines whether to grant or deny the first device access to the secure resource based on the verification of the received authentication mechanism.
摘要:
Methods for obtaining a three-dimensional (3D) mesh from two dimensional images are provided. The methods include obtaining a series of 2D images using a camera array; calculating a depth map using the obtained series of 2D images; identifying portions of the calculated depth map that need additional detail; applying a textured based algorithm to the identified portions of the calculated depth map to obtain the additional detail in the depth map; and combining the calculated depth map with the obtained additional detail to provide a more accurate 3D mesh. Related systems and computer program products are also provided.