摘要:
Embodiments of the present invention include a video server that can detect and track the image of a pointing indicator in an input video stream representation of a computer display. The video server checks ordered frames of the video signal and determines movements for a pointing indicator such as a mouse arrow. Certain motions by the pointing indicator, such as lingering over a button or menu item or circling a button or menu item can provoke a control action on the server.
摘要:
Embodiments of the present invention include systems, methods, and computer readable media for processing electronic mail attachments. Embodiments of the present invention intercept electronic mail messages containing attachments, and transmit the attachments to a file server. A message parser removes the file attachments from the messages and inserts hypertext links or executables directing the recipient to the copy of the attachment stored on the file server.
摘要:
A medium, system and method of processing content information. In one exemplary embodiment, the medium, system and method include determining associated previously accessed content information in response to an action performed on a document containing information and based on a context of the information, and indicating to a user the determined associated content information.
摘要:
A physical key is used to propose an association between a guest device and user information and services. Contact-based or contact-less connectors are used to establish the proposed association between the physical key and the guest device. The proposed association then communicated to the dynamic authentication system over a first communication channel. The dynamic authentication system determines a user confirmation over a second communications channel based on a user device and previously determined associations between users, user devices and the physical key. The guest device is then authenticated for access to information and/or services associated with the user. The information retrieved from and/or transmitted to the user's personal information repository is optionally protected using various transformations. Optional session identifiers supported on the physical key and/or the user device, ensure the protected information is inaccessible when the physical key is removed and/or the predetermined association with the user device is deleted.
摘要:
An access server allows secure access to commonly used files stored on multiple file sources from a variety of client devices. The access server extracts a list of file sources associated with the user, and accesses each of those sources. The server is then configured to extract a list of most recently used files by the current user as well as information associated with those files. The access server also processes electronic mail attachments. The access server intercepts electronic mail messages containing attachments, and transmits the attachments to a file server.
摘要:
User behavior while interacting with one or more first representations of digital content can be monitored. Interaction information can be determined by monitoring the user behavior while interacting. Interaction information can include information identifying interaction areas of the first representation, degree of interaction information, and sequence of interaction information. The interaction information can be maintained and used to deform a second representation of digital content. The first and second representations can be of the same or different digital content.
摘要:
A physical key is used to propose an association between a guest device and user information and services. Contact-based or contact-less connectors are used to establish the proposed association between the physical key and the guest device. The proposed association then communicated to the dynamic authentication system over a first communication channel. The dynamic authentication system determines a user confirmation over a second communications channel based on a user device and previously determined associations between users, user devices and the physical key. The guest device is then authenticated for access to information and/or services associated with the user. The information retrieved from and/or transmitted to the user's personal information repository is optionally protected using various transformations. Optional session identifiers supported on the physical key and/or the user device, ensure the protected information is inaccessible when the physical key is removed and/or the predetermined association with the user device is deleted.
摘要:
Embodiments of the present invention enable the extraction, classification, storage, and supplementation of presentation video. A media system receives a video signal carrying presentation video. The media system processes the video signal and generates images for slides of the presentation. The media system then extracts text from the images and uses the text and other characteristics to classify the images and store them in a database. Additionally, the system enables viewers of the presentation to provide feedback on the presentation, which can be used to supplement the presentation.
摘要:
Systems and methods for processing automatically generated recommendations. In various exemplary embodiments, a method of producing a recommendation digest for a user includes (a) generating a recommendation log for the user by storing a plurality of recommendations, one or more of the plurality of recommendations relating to a representation of a context that led to the creation of the one or more recommendations for the user, and (b) determining a subset of recommendations by using one or more statistics obtained from processing the plurality of recommendations stored in the log.
摘要:
The present invention discloses a proxy server that enables remote users to securely share files. A proxy server maintains credentials for accessing files on secure file sources. By sharing a file a user of the file source generates a proxy representation that maintains information about the location of the file and mechanisms for accessing the file. When the recipient submits changes the proxy server executes those changes on the original file.