摘要:
Fingerprint portions of two or more different fingers are detected on a detection surface, such as an optical surface, a touch pad, a touchscreen, or the like, and then a further detection made that the person has moved their finger(s), for example, apart, together or relative to one another. The movement can be detected based on identifying the fingerprint portion sliding across the screen. The combination of fingerprint information associated with a corresponding motion is correlatable to one or more actions or triggering events that are used to control one or more electronic devices. Further aspects are directed toward utilizing one or more of the techniques herein for a security application. For example, two users, each placing one or more fingers on a touch screen or touch pad, with the fingerprints thereafter being recognized, perform a certain movement with this triggering the unlocking, or locking, of an object.
摘要:
Fingerprint portions of two or more different fingers are detected on a detection surface, such as an optical surface, a touch pad, a touchscreen, or the like, and then a further detection made that the person has moved their finger(s), for example, apart, together or relative to one another. The movement can be detected based on identifying the fingerprint portion sliding across the screen. The combination of fingerprint information associated with a corresponding motion is correlatable to one or more actions or triggering events that are used to control one or more electronic devices. Further aspects are directed toward utilizing one or more of the techniques herein for a security application. For example, two users, each placing one or more fingers on a touch screen or touch pad, with the fingerprints thereafter being recognized, perform a certain movement with this triggering the unlocking, or locking, of an object.
摘要:
A communication system receives data that does not pertain to an attempted initial establishment of a communication. The communication system uses a new message format under an existing analog Caller ID standard. The communication system inserts the data (which can be in addition to existing Caller ID data) into a Caller ID message that uses the new message format. The communication system then sends the Caller ID message to a communication device/Private Branch Exchange (PBX)/contact center that can interpret the new message format.The communication device/PBX/contact center can use the data to further route the communication to a specific telephone and/or can use the data to display information such as Global Positioning System (GPS) coordinates of a cell phone. The data can enhance the capabilities of devices and systems that currently work under the Public Switched Telephone Network (PSTN).
摘要:
The system generates a first data stream which represents a data signal. The first data stream is encoded via a first encoding technique. The first data stream comprises one or more packets with a duration and timestamp. The data signal is encoded into a second data stream using a different encoding technique with a corresponding packet in the second data stream. A packet in the second data stream has the same duration and timestamp as the corresponding packet in the first data stream.The first data stream is sent on a first network. The second data stream is sent on a second network. The first and second data streams are received. A missing/delayed packet in the first data stream is detected. The data signal is regenerated using the first data stream and the packet from the second data stream that corresponds to the missing/delayed packet in the first data stream.
摘要:
A communication system receives data that does not pertain to an attempted initial establishment of a communication. The communication system uses a new message format under an existing analog Caller ID standard. The communication system inserts the data (which can be in addition to existing Caller ID data) into a Caller ID message that uses the new message format. The communication system then sends the Caller ID message to a communication device/Private Branch Exchange (PBX)/contact center that can interpret the new message format. The communication device/PBX/contact center can use the data to further route the communication to a specific telephone and/or can use the data to display information such as Global Positioning System (GPS) coordinates of a cell phone. The data can enhance the capabilities of devices and systems that currently work under the Public Switched Telephone Network (PSTN).
摘要:
One or more participants in a communication are authenticated using an authentication metric such as a face print or voice print. A single telecommunication address (or one for each participant) that is not associated with a communication device and is associated with at least one of the participants is determined. The telecommunication address (or addresses) is sent during the initiation of a communication session.Other embodiments provide for sending a single associated telecommunications address, individual identifiers of each of the participants, and a communication device name to better identify exactly who is calling. The system can also detect when an additional participant has joined the communication session and when a participant leaves the communication session.
摘要:
The system generates a first data stream which represents a data signal. The first data stream is encoded via a first encoding technique. The first data stream comprises one or more packets with a duration and timestamp. The data signal is encoded into a second data stream using a different encoding technique with a corresponding packet in the second data stream. A packet in the second data stream has the same duration and timestamp as the corresponding packet in the first data stream.The first data stream is sent on a first network. The second data stream is sent on a second network. The first and second data streams are received. A missing/delayed packet in the first data stream is detected. The data signal is regenerated using the first data stream and the packet from the second data stream that corresponds to the missing/delayed packet in the first data stream.
摘要:
A method for controlling a multi-media presentation is provided. The method includes displaying an event structure related to an event on a graphical user interface, getting a plurality of event items associated with the event, and displaying the plurality of event items associated with the event structure on the graphical user interface. Responsive to an event trigger, the event is started. The method further includes receiving a selection of a first event item from the plurality of event items, performing a first action related to the first event item, and sending an output of the first action to a display device.
摘要:
An authentication string, such as a password, consists of characters. Each of the characters in the authentication string is randomly associated with a defined location on a device. For example, an area on a touch screen can be associated with a character in the authentication string. When a user selects a location associated with the character, feedback is provided that identifies the character. When the user selects a location that is not associated with the character, feedback is provided that does not identify the character.If the user responds by indicating that the associated location matches the character, the character is authenticated. If the user responds by indicating that a location not associated with the character is a match, the character is not authenticated. This process is then repeated for each character in the authentication string.
摘要:
A text object(s) such as a document containing a plurality of text items (e.g., chapters, paragraphs, etc.) is used to generate a search term. At least one, but not all, of the text items in the text object are selected based on a profile. The selected text item(s) are parsed to generate one or more search terms. This allows a user to drag-and-drop a graphical text object into a search engine icon to automatically perform a search based on the profile. Alternatively, a non-text object (e.g., an image) containing any identifiable item is used to generate the search term. Based on the profile, the item is parsed to generate a text representation of the item. The text representation of the item is used to generate one or more search terms.