摘要:
A gaming device, method, and computer program product customize an electronic game using features of an image file, such as may be created by a digital camera or similar device. A gaming device comprises a processor capable of receiving an image file, extracting at least one feature from the received image file, and modifying the electronic game based on the extracted feature. The processor may modify the electronic game by adding a game object corresponding to the extracted feature. Alternatively, the processor may modify the electronic game by modifying a game object based on the extracted feature. The image file may be created by the gaming device or may be received from an external device. The extracted feature may be selected from the group comprising shape, size, location, orientation, color, and contrast. The processor may be further capable of preprocessing the image file.
摘要:
A gaming device, method, and computer program product customize an electronic game using features of an image file, such as may be created by a digital camera or similar device. A gaming device comprises a processor capable of receiving an image file, extracting at least one feature from the received image file, and modifying the electronic game based on the extracted feature. The processor may modify the electronic game by adding a game object corresponding to the extracted feature. Alternatively, the processor may modify the electronic game by modifying a game object based on the extracted feature. The image file may be created by the gaming device or may be received from an external device. The extracted feature may be selected from the group comprising shape, size, location, orientation, color, and contrast. The processor may be further capable of preprocessing the image file.
摘要:
A system of providing location and routing information to a target mobile terminal while still maintaining a specified level of privacy. A target mobile terminal includes a profile having an inaccuracy level contained therein. When a querying terminal desires routing information to the target terminal, a portion of a route to the target terminal is provided, with the portion of the provided route being based upon the level of inaccuracy in the target terminal profile.
摘要:
Securing the boot phase of a computing system implemented as a distributed architecture device can be performed by a system or method that uses hash functions and public key infrastructure (PKI) to verify the authenticity of modular subsystems. The modular subsystems can verify each other's authenticity, and can prevent unauthorized components from being inserted into the system when the system is without power.
摘要:
According to one embodiment a method is disclosed involving storing in a device a static policy framework and one or more dynamic policy algorithms, and controlling policy management in the device by operating the static policy framework and executing the dynamic policy algorithms. The invention also provides in other embodiments an apparatus configured to perform such a method and a computer program product for performing the method.
摘要:
A security gateway connects an external portion of a virtual private network to an internal secured portion of the network. The gateway is arranged to identify automatically when a communication session exists between two mobile workstations both of which are connected in the external portion of the network. The mobile workstations are then enabled to communicate with each other without using the gateway as an intermediary. This communication can be secured. The route by which packets are transferred between the workstations may then be optimised.
摘要:
A system of providing location and routing information to a target mobile terminal while still maintaining a specified level of privacy. A target mobile terminal includes a profile having an inaccuracy level contained therein. When a querying terminal desires routing information to the target terminal, a portion of a route to the target terminal is provided, with the portion of the provided route being based upon the level of inaccuracy in the target terminal profile.
摘要:
A data handling mechanism, wherein a small binary tag is appended to data (each message and file) for controlling the access and handling of the data. The tag contains dedicated bits for indicating its various usage rights such as copying, forwarding, editing and also right to edit the tag itself. The tag is created by an author of the data or by any other party handling the data, including middleware agents and possible recipients of the data based on contextual information such as network or ownership domain of the author and/or of the recipient.
摘要:
Securing the boot phase of a computing system implemented as a distributed architecture device can be performed by a system or method that uses hash functions and public key infrastructure (PKI) to verify the authenticity of modular subsystems. The modular subsystems can verify each other's authenticity, and can prevent unauthorized components from being inserted into the system when the system is without power.
摘要:
This invention provides a handset (10) and a method of operating a handset. The handset includes a user interface that contains a data entry device (20) and a visual display device (14), a camera (16) and a controller (12) coupled to the visual display device and to the camera. The controller operates under the control of a stored program (22A) for displaying to a user an image representative of at least a portion of an environment of the user as seen through the camera during a time that the user is interacting with the user interface. The controller may further operate under control of the stored program to process images generated by the camera to detect a potential for a collision with an object that is present in the environment of the user, and to warn the user of the potential for a collision.