会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • User drawn circled region extraction from scanned documents
    • 用户从扫描文件中提取圆圈区域
    • US06597808B1
    • 2003-07-22
    • US09454633
    • 1999-12-06
    • Jinhong GuoJunichi Kanai
    • Jinhong GuoJunichi Kanai
    • G06K934
    • G06K9/2054G06K2209/01
    • The scanned document is analyzed by connected component extraction and by calculating bounding boxes for each connected component. The connected components representing text, halftone images and characters overlapping the user-drawn circled region are eliminated to define candidate objects. The contour of candidate objects are generated and feature points are calculated including junctions of circles with other objects. Then, the user-drawn circled region is reconstructed by defining the contour segments belonging to the same circle. The user-drawn circle is recognized through a series of tests based on the size as well as the area the contour covers. The circle is further defined by removing or disregarding open arcs. After the user-drawn circle is fully identified, the image inside the bounding box of the contour is extracted and optical recognition may be optionally performed on the extracted image.
    • 扫描的文档通过连接的组件提取和通过计算每个连接的组件的边界框进行分析。 消除了表示文本,半色调图像和与用户绘制的圆圈区域重叠的字符的连接的组件,以定义候选对象。 生成候选对象的轮廓,并计算包含与其他对象的圆的交点的特征点。 然后,通过定义属于同一个圆的轮廓段来重构用户绘制的圆圈区域。 用户绘制的圆是通过基于大小以及轮廓覆盖的区域的一系列测试来识别的。 通过移除或忽略开放弧线进一步定义圆。 在完全识别用户绘制的圆之后,提取轮廓的边界框内的图像,并且可以在提取的图像上可选地执行光学识别。
    • 4. 发明申请
    • Intrusion detection via high dimensional vector matching
    • 通过高维矢量匹配的入侵检测
    • US20080120720A1
    • 2008-05-22
    • US11601864
    • 2006-11-17
    • Jinhong GuoDaniel WeberStephen JohnsonIl-Pyung Park
    • Jinhong GuoDaniel WeberStephen JohnsonIl-Pyung Park
    • G06F21/00
    • G06F21/552
    • A method is provided for detecting intrusions to a computing environment. The method includes: monitoring system calls made to an operating system during a defined period of time; evaluating the system calls made during the defined time period in relation to system calls made during known intrusions; and evaluating the temporal sequence in which system calls were made during the defined time period when the system calls made match the system calls made during a known intrusion. If a potential intrusion is detected at this stage, then a more complicated detection scheme may be performed by a second detection scheme. For instance, the second detection scheme may assess the temporal sequence in which the system calls were made and/or the system files accessed by the system calls.
    • 提供了一种用于检测对计算环境的入侵的方法。 该方法包括:在定义的时间段内监视对操作系统的系统调用; 评估在定义的时间段内与在已知入侵期间进行的系统呼叫相关的系统呼叫; 并且在系统调用所规定的时间段期间评估进行系统调用的时间序列,使得在已知入侵期间进行的系统呼叫匹配。 如果在该阶段检测到潜在入侵,则可以通过第二检测方案来执行更复杂的检测方案。 例如,第二检测方案可以评估系统调用的时间顺序和/或系统调用所访问的系统文件。
    • 5. 发明申请
    • Run length based connected components and contour following for enhancing the performance of circled region extraction algorithm
    • 运行长度连通的组件和轮廓跟随,以提高圆盘区域提取算法的性能
    • US20050238235A1
    • 2005-10-27
    • US11108168
    • 2005-04-15
    • Jinhong Guo
    • Jinhong Guo
    • G06T7/60G06K9/48G06K9/50G06T9/00G06T9/20
    • G06K9/50G06K9/48G06K2209/01G06T9/005G06T9/20
    • A method for identifying contours in image data includes expressing pixel-based image data as a grid of columns and rows. A scan order is established over the grid to define a parent-child relationship between contiguous pixels in adjacent rows and to define a sibling relationship among non-contiguous pixels in the same row. A run data structure is established in computer-readable memory that defines a run member by its row position and by its starting and ending column positions. The run data structure further defines parent, child and sibling structures for storing information about the parent-child relationships and sibling relationships of pixels associated with the run member. The run data structure is used to traverse the parent, child and sibling relationships and thereby identify contours within the pixel-based image data.
    • 用于识别图像数据中的轮廓的方法包括将基于像素的图像数据表示为列和列的网格。 在网格上建立扫描顺序以在相邻行中的邻接像素之间定义父子关系,并在同一行中定义非连续像素之间的兄弟关系。 在计算机可读存储器中建立运行数据结构,其通过其行位置及其起始和终止列位置来定义运行成员。 运行数据结构还定义了父,子和兄弟结构,用于存储关于与运行成员关联的像素的父子关系和兄弟关系的信息。 运行数据结构用于遍历父,子和兄弟关系,从而识别基于像素的图像数据内的轮廓。
    • 8. 发明申请
    • Printing control interface system and method with handwriting discrimination capability
    • 具有手写识别功能的打印控制界面系统和方法
    • US20050248808A1
    • 2005-11-10
    • US11170301
    • 2005-06-28
    • Yue MaJinhong Guo
    • Yue MaJinhong Guo
    • B41J29/00G06F3/12G06K9/62G06K9/68G06T7/00H04N1/38H04N1/40G06F15/00
    • G06K9/6835H04N1/38H04N1/40062
    • A system and method for identifying and separating handwritten text from machine printed text in a document having a combination of handwritten text and machine printed text. In one embodiment, the present invention is installed as an intelligent printing control interface in a conventional computer and allows any document generated by any application to be selectively processed to remove any handwritten text prior to printing of the document, under the control of the user. In an alternative embodiment, the present invention is installed as an intelligent printing control interface in a conventional digital copy machine, which allows any document being copied to be selectively processed to remove any handwritten text prior to printing of the document, under the control of the user. The present invention employs a handwriting separation method which uses Hidden Markov Models to identify regions as either handwritten text or machine printed text.
    • 一种用于在具有手写文本和机器打印文本的组合的文档中识别和分离手写文本与机器打印文本的系统和方法。 在一个实施例中,本发明作为智能打印控制接口安装在常规计算机中,并且允许任何应用程序生成的任何文档在用户的控制下在文档打印之前被选择性地处理以移除任何手写文本。 在替代实施例中,本发明作为智能打印控制接口安装在传统的数字复印机中,其允许任何被复制的文档被选择性地处理,以在打印文档之前移除任何手写文本, 用户。 本发明采用手写分离方法,其使用隐马尔可夫模型将区域识别为手写文本或机器打印文本。