摘要:
A directive projection screen is configured to present images projected from a remote projector in three dimensions (3D) to a viewer. The screen includes a plurality of passive optical elements arranged on a structural substrate. The optical elements are configured to receive incident light projected from the projector and reflect the light such that first portions of the image are directed in a first direction to be viewed by a first eye of the viewer and second portions of the image are directed in a second direction to be viewed by a second eye of the viewer.
摘要:
A device includes a projection and camera system to create an augmented reality environment in which images are projected onto a scene and user movement within the scene is captured. The projection and camera system have a camera to image scattered IR light from the scene and compute time of flight values used in depth mapping of objects in the room. The system also has a projector to project the images onto the scene. The projected images and scattered IR light use a common optical path through the same lens. Additionally, an illumination system used to illuminate the scene with the IR light may also use the common optical path through the same lens. In one implementation, the projection and camera system are mounted in a movable head of a table lamp.
摘要:
A device includes a projection and camera system to create an augmented reality environment in which images are projected onto a scene and user movement within the scene is captured. The projection and camera system have a camera to image scattered IR light from the scene and compute time of flight values used in depth mapping of objects in the room. The system also has a projector to project the images onto the scene. The projected images and scattered IR light use a common optical path through the same lens. Additionally, an illumination system used to illuminate the scene with the IR light may also use the common optical path through the same lens. In one implementation, the projection and camera system are mounted in a movable head of a table lamp.
摘要:
A licensing system is disclosed for performing synchronous encryption with a client over an IP-compliant network. In disclosed embodiments, the system includes a licensing agent configured to pass a data structure unencrypted in an initial communication between the licensing agent/client pair and pass a first key to said client responsive to an initial communication. The licensing agent then receives the data structure from the client having designated fields encrypted according to the first key. The licensing agent then sends a second key to the client for use in subsequent communications.
摘要:
A multi-homed web server with modular functionality is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time.
摘要:
A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time. The web server software may be compiled as part of the native web server code.
摘要:
A Web server is provided having a multi-homed, modular framework. The modular framework allows extensions to the Web server to be easily compiled into the Web server, allowing the extensions to run natively as part of the server instead of incurring the overhead typical of CGI scripts, for example. The multi-homing capabilities of the Web server provide the appearance to Web users of multiple distinct and independent servers, allowing a small company or individual to create the same kind of Web presence enjoyed by larger companies. In effect, multiple virtual servers run on the same physical machine. The Web server as a whole is easily extensible to allow additional capabilities to be provided natively within the Web server itself. Furthermore, each virtual server is independently configurable in order to turn different capabilities on or off or to modify operation of the virtual server. The Web server is also provided with enhanced security features, built-in animation capability, and other features that afford maximum flexibility and versatility.
摘要:
The present invention provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs “envoys” that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the best of both worlds. No traffic can pass through the firewall unless the firewall has established an envoy for that traffic. Both connection-oriented (e.g., TCP) and connectionless (e.g., UDP-based) services may be handled using envoys. Establishment of an envoy may be subjected to a myriad of tests to “qualify” the user, the requested communication, or both. Therefore, a high level of security may be achieved. The usual added burden of prior-art proxy systems is avoided in such a way as to achieve fall transparency—the user can use standard applications and need not even know of the existence of the firewall. To achieve full transparency, the firewall is configured as two or more sets of virtual hosts. The firewall is, therefore, “multi-homed,” each home being independently configurable. One set of hosts responds to addresses on a first network interface of the firewall. Another set of hosts responds to addresses on a second network interface of the firewall. In one aspect, programmable transparency is achieved by establishing DNS mappings between remote hosts to be accessed through one of the network interfaces and respective virtual hosts on that interface. In another aspect, automatic transparency may be achieved using code for dynamically mapping remote hosts to virtual hosts in accordance with a technique referred to herein as dynamic DNS, or DDNS.
摘要:
The present invention, generally speaking, provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs “envoys” that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the best of both worlds. No traffic can pass through the firewall unless the firewall has established an envoy for that traffic. Both connection-oriented (e.g., TCP) and connectionless (e.g., UDP-based) services may be handled using envoys. Establishment of an envoy may be subjected to a myriad of tests to “qualify” the user, the requested communication, or both. Therefore, a high level of security may be achieved. The usual added burden of prior-art proxy systems is avoided in such a way as to achieve full transparency—the user can use standard applications and need not even know of the existence of the firewall. To achieve full transparency, the firewall is configured as two or more sets of virtual hosts. The firewall is, therefore, “multi-homed,” each home being independently configurable. One set of hosts responds to addresses on a first network interface of the firewall. Another set of hosts responds to addresses on a second network interface of the firewall. In one aspect, programmable transparency is achieved by establishing DNS mappings between remote hosts to be accessed through one of the network interfaces and respective virtual hosts on that interface. In another aspect, automatic transparency may be achieved using code for dynamically mapping remote hosts to virtual hosts in accordance with a technique referred to herein as dynamic DNS, or DDNS.
摘要:
Techniques are described for adapting a keyboard arrangement to be personalized for a user, based on detected gestures made by the user while employing the keyboard arrangement. An adaptable keyboard arrangement may be provided for the user as part of a device, projected onto a surface near the user, or rendered abstractly into a space near the user. Sensor and/or contextual data may be employed to identify mistypes or near-mistypes of the user, and a statistical model may be developed of the user's typing habits. Keyboard modifications may be determined that adapt the keyboard to minimize potential typing errors and/or provide a more ergonomic keyboard arrangement for the user.