摘要:
Herein described is a system and method that tracks the face of a person engaged in a videophone conversation. In addition to performing facial tracking, the invention provides stabilization of facial images that are transmitted during the videophone conversation. The face is tracked by employing one or more algorithms that correlate videophone captured facial images against a stored facial image. The face may be better identified by way of employing one or more voice recognition algorithms. The one or more voice recognition algorithms may correlate utterances of the person engaged in a conversation to one or more stored utterances. The identified utterances are subsequently mapped to a stored facial image. In a representative embodiment, the system used for performing facial tracking and image stabilization comprises an image sensor, a lens, an actuator, and a controller/processor.
摘要:
Herein described is a system and method for modifying facial video transmitted from a first videophone to a second videophone during a videophone conversation. A videophone comprises a videophone image processing system (VIPS) that stores one or more preferred images. The one or more preferred images may comprise an image of a person presented in an attractive appearance. The one or more preferred images may comprise one or more avatars. Additionally, the VIPS may be used to incorporate one or more facial features of the person into a preferred image or avatar. Furthermore, a replacement background may be incorporated into the preferred image or avatar. The VIPS transmits a preferred image of a first speaker of a first videophone to a second speaker of a second videophone by capturing an actual image of the first speaker and substituting at least a portion of said actual image with a stored image.
摘要:
Aspects of a method and system for multi-level security initialization and configuration are provided. A security system may comprise a security processor, a host processor, and at least one security component, such as a descrambler. The security processor may enable a security component based on information stored within a non-volatile memory integrated within the security processor. The host processor may enable generation of at least one configuration command communicated to the security processor for configuring the enabled security component. The configuration command may correspond to a security control operational mode for the security component that may indicate, for example, activation or deactivation of the security component. The security processor may authenticate a digital signature in the configuration command. Initialization and configuration may be performed during a system boot sequence of the security system.
摘要:
The present invention provides a sealing ring and a preparation method thereof. The sealing ring, based on percent by weight, includes 80%-85% of aluminum, 10%-15% of titanium, 0.1%-1% of scrap iron, and 4%-4.9% of potassium fluoroaluminate. Moreover, the present invention provides a method for preparing sealing ring, which includes the following steps: Step A: melting the aluminum in a medium-frequency induction furnace, adding the potassium fluoroaluminate to the medium-frequency induction furnace after melting the aluminum, melting and stirring the mixture evenly; Step B: adding titanium scrap or sponge titanium, and scrap iron to the mixture successively, melting and mixing the mixture totally at 800° C. to 1200° C., standing the mixture after stirring evenly; Step C: removing scum on the surface; Step D: casting into a mold to obtain a final sealing ring.
摘要:
Aspects of a method and system for managing quality of service via a broadband gateway are provided. In this regard, a broadband gateway that supports one or more first QoS protocols may determine, based on communications with a plurality of communication devices, whether each of the plurality of communication devices supports the one or more first QoS protocols. The gateway may communicate a result of the determination to a content provider and/or service provider. In this manner, the content provider and/or service provider may determine whether to utilize one or more second QoS protocols to deliver content to a particular one of said plurality of communication devices based on whether said particular of communication devices based on whether said particular one of said plurality of communication devices supports the one or more first QoS protocols. The gateway may be operable to map between QoS protocols.
摘要:
Certain aspects of a method and system for improved fault tolerance in distributed customization controls using non-volatile memory are disclosed. Aspects of one method may include mapping an input control signal to a plurality of input logic circuits within a security processor. A plurality of independent processing paths may be defined between each of the plurality of input logic circuits and an output logic circuit. Each of the plurality of independent processing paths may comprise one or more logic circuits. The input control signal may be routed via at least a portion of the plurality of independent processing paths. The portion of the plurality of independent processing paths may be combined in the output logic circuit to generate the input control signal.
摘要:
Media gateways (MGs), grouped into a hierarchy, are operable to provide a multiparty conferencing among client devices. Gateway resources such as processors, Codecs and network interfaces are aggregated at each MG to establish distributed connection sessions based on resource management metrics such as minimizing total network. The distributed connection sessions are utilized to provide the multiparty conferencing. Each MG may aggregate the gateway resources, which may be determined utilizing a look-up table, from other MGs for sharing among the MGs. Each MG may be activated to provide the media gateway controller (MGC) processing utilizing the shared aggregated gateway resources. A MG may be de-activated from the MGC processing when needed and the associated connection sessions may be subsequently released. Gateway resources are managed at each MG based on the resource management metrics in order to establish distributed connection sessions to support the multiparty conferencing among the client devices.
摘要:
A server may be used to handle at least some of processing of content that is based on web access operations initiated in a set-top box (STB), wherein one or more links between the server and the STB that are used to forward multimedia broadcasts are configured to free bandwidth for communicating at least a portion of the processed content to the STB. The bandwidth may be freed based on switched digital video (SDV) and/or dedicated IPTV channels or systems. The broadcast links may be reconfigured based on monitoring of multimedia broadcast access by the STB and/or one or more other STBs. The freed bandwidth in the multimedia broadcast links may be configured for unicast transport of processed content to a specific STB, or may be configured for multicast transport of the processed content to a plurality of STBs.
摘要:
A broadband gateway configured to operate as a virtual broadband gateway may comprise a network portion and a local portion. The network portion is communicatively coupled to the local portion via a plurality of physical layer connections to one or more network access service providers. The virtual broadband gateway may acquire content from one or more providers, process the content for delivery to one or more local devices, and deliver the content to the one or more local devices. The remote portion may be implemented in one or more network devices. The network devices may be owned and/or operated by one or more content providers, one or more network access service providers, and/or one or more independent entities. Gateway functions performed by the network portion may comprise, for example, content downloading, content streaming, content authentication, data format conversion, service negotiation, service selection, data encryption, data decryption and/or data storage.
摘要:
A method and system are provided in which a broadband gateway may enable a guest or visitor to access content available to the broadband gateway. The content may be received by the broadband gateway through one or more of a plurality of network access service providers that may provide separate physical layer access to the broadband gateway. After a visitor's device is connected to the broadband gateway, the broadband gateway may classify the device. Based on the classification, the device may be authorized to access a portion of the content received. Once the authorization process is complete, the appropriate content may be made available and transferred to the device. The authorization process may include the authentication of a device identifier and/or a user identifier. The authorized access may be time-limited, but may be renewed or enabled when a request is received within a determined period of time.