会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 82. 发明申请
    • SYSTEMS AND METHODS FOR REMOTE WORK SESSIONS
    • 远程工作会议的系统和方法
    • US20110286638A1
    • 2011-11-24
    • US13180277
    • 2011-07-11
    • Daniel E. TedescoJames A. JoraschGeoffrey M. GelmanJay S. WalkerStephen C. TulleyVincent M. O'NeilDean P. Alderucci
    • Daniel E. TedescoJames A. JoraschGeoffrey M. GelmanJay S. WalkerStephen C. TulleyVincent M. O'NeilDean P. Alderucci
    • G06K9/00G06K9/62
    • H04L67/12G06F17/30256G06F17/30259G08B13/19641G08B13/19656G08B13/19663G08B13/19673G08B13/1968H04L63/08
    • Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
    • 这里公开的是用于促进在线劳动力的使用以远程监视安全敏感站点并报告潜在安全漏洞的系统和方法。 在一些实施例中,照相机被配置为监测关键的民用基础设施,例如供水和核反应堆。 相机可操作地连接到中央计算机或一系列计算机,并且由相机拍摄的图像被传送到中央计算机。 最初向中央电脑注册后,监护人“登录”到由中央电脑主办的中央网站,并监控图像,从而获得赔偿。 在一个实施例中,为了简单地确定图像中是否存在人的简单确定,将“无人”区域 - 不存在人或车辆的场所的图像发送给监护人。 网站所有者对计算机系统的运营商进行补偿,用于此监控服务,而运营商又根据(i)监控时间量和/或(ii)给定的监护人的响应程度来补偿监护人 实际或制造安全漏洞。 除此之外,本文还公开了系统和方法,以便于(a)监控站点的注册,(b)监护人的注册,(c)管理监控会话,包括将真实和制造的映像路由到监护人, 监护人的评级和监护人的赔偿。 涵盖了许多附加和替代实施例,包括一个实施例的以下示例。
    • 84. 发明授权
    • System for image analysis in a network that is structured with multiple layers and differentially weighted neurons
    • 在多层和差分加权神经元结构的网络中进行图像分析的系统
    • US07596260B2
    • 2009-09-29
    • US11427466
    • 2006-06-29
    • Daniel E. TedescoJames A. JoraschGeoffrey M. GelmanJay S. WalkerStephen C. TulleyVincent M. O'NeilDean P. Alderucci
    • Daniel E. TedescoJames A. JoraschGeoffrey M. GelmanJay S. WalkerStephen C. TulleyVincent M. O'NeilDean P. Alderucci
    • G06K9/00
    • H04L67/12G06F17/30256G06F17/30259G08B13/19641G08B13/19656G08B13/19663G08B13/19673G08B13/1968H04L63/08
    • Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches.In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches.Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
    • 这里公开的是用于促进在线劳动力的使用以远程监视安全敏感站点并报告潜在安全漏洞的系统和方法。 在一些实施例中,照相机被配置为监测关键的民用基础设施,例如供水和核反应堆。 相机可操作地连接到中央计算机或一系列计算机,并且由相机拍摄的图像被传送到中央计算机。 最初向中央电脑注册后,监护人“登录”到由中央电脑主办的中央网站,并监控图像,从而获得赔偿。 在一个实施例中,为了简单地确定图像中是否存在人的简单确定,将“无人”区域 - 不存在人或车辆的场所的图像发送给监护人。 网站所有者对计算机系统的运营商进行补偿,用于此监控服务,而运营商又根据(i)监控时间量和/或(ii)给定的监护人的响应程度来补偿监护人 实际或制造安全漏洞。 除此之外,本文还公开了系统和方法,以便于(a)监控站点的注册,(b)监护人的注册,(c)管理监控会话,包括将真实和制造的映像路由到监护人, 监护人的评级和监护人的赔偿。 涵盖了许多附加和替代实施例,包括一个实施例的以下示例。