会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 88. 发明申请
    • Methods and apparatus for determining an outcome for a gaming device based on a factor other than a random number
    • 用于基于除了随机数之外的因素确定游戏设备的结果的方法和装置
    • US20070087813A1
    • 2007-04-19
    • US11565741
    • 2006-12-01
    • Jay WalkerJames JoraschGeoffrey GelmanMagdalena Fincham
    • Jay WalkerJames JoraschGeoffrey GelmanMagdalena Fincham
    • A63F9/24
    • G07F17/3237G07F17/32
    • In accordance with one or more embodiments of the present invention, a player input is used as a value for a variable in an algorithm of a gaming device. The algorithm, in turn, is used to generate a pseudorandom value. The pseudorandom value, in turn, is used to determine an outcome for a game of the gaming device. Accordingly, a player is allowed to influence the outcome of a game by providing an input. The input may comprise, for example, a numeric input, a biometric input, or a physical input. The latter two types of inputs may be converted to a numeric form before being used in the algorithm. In accordance with one or more embodiments, a player input comprises selection of an algorithm for use in generating a pseudorandom value to be used to determine an outcome for a game of a gaming device. In accordance with one or more embodiments, a player input comprises a player selection of a visual representation of a pseudorandom value to be used to determine an outcome for a game of a gaming device.
    • 根据本发明的一个或多个实施例,播放器输入被用作游戏设备的算法中的变量的值。 该算法又用于生成伪随机值。 反过来,伪随机数值用于确定游戏设备游戏的结果。 因此,允许玩家通过提供输入来影响游戏的结果。 输入可以包括例如数字输入,生物特征输入或物理输入。 在算法中使用后两种类型的输入可以被转换成数字形式。 根据一个或多个实施例,玩家输入包括选择用于生成用于确定游戏设备的游戏的结果的伪随机值的算法。 根据一个或多个实施例,播放器输入包括用于确定游戏设备的游戏的结果的伪随机值的视觉表示的玩家选择。
    • 90. 发明申请
    • SYSTEM FOR IMAGE ANALYSIS IN A NETWORK THAT IS STRUCTURED WITH MULTIPLE LAYERS AND DIFFERENTIALLY WEIGHTED NEURONS
    • 网络中的图像分析系统,其结构与多层和差分加权神经元
    • US20070070213A1
    • 2007-03-29
    • US11427480
    • 2006-06-29
    • Daniel TEDESCOJames JoraschGeoffrey GelmanJay WalkerStephen TulleyVincent O'NeilDean Alderucci
    • Daniel TEDESCOJames JoraschGeoffrey GelmanJay WalkerStephen TulleyVincent O'NeilDean Alderucci
    • H04N5/228
    • H04L67/12G06F17/30256G06F17/30259G08B13/19641G08B13/19656G08B13/19663G08B13/19673G08B13/1968H04L63/08
    • Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches. Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
    • 本文公开的是用于促进在线劳动力的使用以远程监视安全敏感站点并报告潜在安全漏洞的系统和方法。 在一些实施例中,照相机被配置为监测关键的民用基础设施,例如供水和核反应堆。 相机可操作地连接到中央计算机或一系列计算机,并且由相机拍摄的图像被传送到中央计算机。 最初向中央电脑注册后,监护人“登录”到由中央电脑主办的中央网站,并监控图像,从而获得赔偿。 在一个实施例中,为了简单地确定图像中是否存在人的简单确定,将“无人”区域 - 不存在人或车辆的场所的图像发送给监护人。 网站所有者对计算机系统的运营商进行补偿,用于此监控服务,而运营商又根据(i)监控时间量和/或(ii)给定的监护人的响应程度来补偿监护人 实际或制造安全漏洞。 除此之外,本文还公开了系统和方法,以便于(a)监控站点的注册,(b)监护人的注册,(c)管理监控会话,包括将真实和制造的映像路由到监护人, 监护人的评级和监护人的赔偿。 涵盖了许多附加和替代实施例,包括一个实施例的以下示例。