摘要:
A method is provided in one example and includes receiving image data at a camera element that is provisioned at a first endpoint, which is configured to conduct a video session involving a second endpoint. The method also includes identifying an incoming request for the video session; signaling to the camera element to open a lens included within the camera element; detecting that the video session has been terminated; and signaling to the camera element to close the lens.
摘要:
A method is provided in one example and includes receiving image data at a camera element that is provisioned at a first endpoint, which is configured to conduct a video session involving a second endpoint. The method also includes identifying an incoming request for the video session; signaling to the camera element to open a lens included within the camera element; detecting that the video session has been terminated; and signaling to the camera element to close the lens.
摘要:
A method is provided in one example and includes receiving audio data at a microphone array that includes a plurality of microphones. The microphone array is provisioned at a first endpoint, which includes a camera element configured to capture video data associated with a video session involving the first endpoint and a second endpoint. The method also includes formatting the audio data into a time division multiplex (TDM) stream, and communicating the stream to a port for a subsequent communication over a network and to the second endpoint.
摘要:
A method is provided in one example and includes receiving audio data at a microphone array that includes a plurality of microphones. The microphone array is provisioned at a first endpoint, which includes a camera element configured to capture video data associated with a video session involving the first endpoint and a second endpoint. The method also includes formatting the audio data into a time division multiplex (TDM) stream, and communicating the stream to a port for a subsequent communication over a network and to the second endpoint.
摘要:
A network-based sales system includes at least one buyer computer for operation by a user desiring to buy a product, at least one merchant computer, and at least one payment computer. The buyer computer, the merchant computer, and the payment computer are interconnected by a computer network. The buyer computer is programmed to receive a user request for purchasing a product, and to cause a payment message to be sent to the payment computer that comprises a product identifier identifying the product. The payment computer is programmed to receive the payment message, to cause an access message to be created that comprises the product identifier and an access message authenticator based on a cryptographic key, and to cause the access message to be sent to the merchant computer. The merchant computer is programmed to receive the access message, to verify the access message authenticator to ensure that the access message authenticator was created using the cryptographic key, and to cause the product to be sent to the user desiring to buy the product.
摘要:
A network-based sales system includes at least one buyer computer for operation by a user desiring to buy a product, at least one merchant computer, and at least one payment computer. The buyer computer, the merchant computer, and the payment computer are interconnected by a computer network. The buyer computer is programmed to receive a user request for purchasing a product, and to cause a payment message to be sent to the payment computer that comprises a product identifier identifying the product. The payment computer is programmed to receive the payment message, to cause an access message to be created that comprises the product identifier and an access message authenticator based on a cryptographic key, and to cause the access message to be sent to the merchant computer. The merchant computer is programmed to receive the access message, to verify the access message authenticator to ensure that the access message authenticator was created using the cryptographic key, and to cause the product to be sent to the user desiring to buy the product.
摘要:
A method is provided in one example and includes receiving a video input from a camera element; using change detection statistics to identify background image data; using the background image data as a temporal reference to determine foreground image data of a particular video frame within the video input; using a selected foreground image for a background registration of a subsequent video frame; and providing at least a portion of the subsequent video frame to a next destination.
摘要:
A method is provided in one example and includes receiving a request to establish a video session between a first user and a second user. The request is sent by the second user by dialing an identifier string associated with the first user. The method also includes evaluating whether the first user has accepted the request. If the first user has not accepted the request over a designated interval, then the second user is directed to an element configured for recording a videomail message for access by the first user. The method also includes identifying the first user has accepted the request, and establishing the video session between the first user and the second user.
摘要:
A method, an apparatus, and logic encoded in a computer-readable medium to carry out a method. The method includes receiving packets containing compressed video information, storing the received packets in a buffer memory, timestamping the received packets according to an adjustable clock; and removing packets from the buffer for decoding and playout of the video information, the removing according to playback order and at a time determined by the adjustable clock. The method includes adjusting the adjustable clock from time to time according to a measure the amount of time that the packets reside in the buffer memory, such that time latency caused by the buffer memory is limited. An overrun or an underrun of the buffer memory is unlikely.
摘要:
Elements in a video conferencing system may respond to error message(s) by aggregating any related error messages and responding based on a severity of the error indicated by the related error messages. A multipoint control unit (MCU) may identify an active stream from a first endpoint and forward the active stream to a second endpoint. The active stream may include a plurality of packets and transmit a video image by sending a frame followed by sub-frame modifications. The MCU may receive an error message from the second endpoint and determine the error's severity, which is related to an impact on an displayed image. Based on the severity, the MCU may identify and send a set of correction packets to the second endpoint. Also, a third endpoint may receive the active stream and respond to one or more error messages received from the second endpoint.