Abstract:
Methods, apparatus, systems, and articles of manufacture for real-time interactive anamorphosis projection via face detection and tracking are disclosed. An example system includes a sensor to capture an image of a face of a user. An augmented reality controller is to access the image from the sensor, determine a position of the face of the user relative to a display surface, and apply a perspective correction to an anamorphic camera representing a vantage point of the active user. A user application is to generate a scene based on the position of the anamorphic camera. A display is to present, at the display surface, the scene based on the vantage point of the active user.
Abstract:
A system and method for user certificate initiation, distribution, and provisioning in converged WLAN-WWAN interworking networks. A computing device operable in a wireless local area network sends a public key to a mobile device operable in a wireless cellular wide area network. The mobile device performs a bootstrapping procedure with a cellular operator in the wireless cellular wide area network to obtain a user certificate based on the public key. The mobile device sends the user certificate to the computing device for installation on the computing device. The user certificate may be used for digital signature, verification, and encryption purposes. The user certificate is also used in both the wireless local area network and the wireless wide area network for authenticating a subscriber when accessing services from both networks.
Abstract:
A system and method for user certificate initiation, distribution, and provisioning in converged WLAN-WWAN interworking networks. A computing device operable in a wireless local area network sends a public key to a mobile device operable in a wireless cellular wide area network. The mobile device performs a bootstrapping procedure with a cellular operator in the wireless cellular wide area network to obtain a user certificate based on the public key. The mobile device sends the user certificate to the computing device for installation on the computing device. The user certificate may be used for digital signature, verification, and encryption purposes. The user certificate is also used in both the wireless local area network and the wireless wide area network for authenticating a subscriber when accessing services from both networks.