会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Color Similarity Sorting for Video Forensics Search
    • 视频取证的颜色相似性排序搜索
    • US20120170838A1
    • 2012-07-05
    • US12982748
    • 2010-12-30
    • Lei WANGShu YangGreg MillerFarzin Aghdasi
    • Lei WANGShu YangGreg MillerFarzin Aghdasi
    • G06K9/00
    • G06K9/4652G06K9/00744G06K9/00771G06K9/522
    • Systems and methods of sorting electronic color images of objects are provided. One method includes receiving an input representation of an object, the representation including pixels defined in a first color space, converting the input image into a second color space, determining a query feature vector including multiple parameters associated with color of the input representation, the query feature vector parameters including at least a first parameter of the first color space and at least a first parameter of the second color space and comparing the query feature vector to multiple candidate feature vectors. Each candidate feature vector includes multiple parameters associated with color of multiple stored candidate images, the candidate feature vector parameters including at least the first parameter from the first color space and at least the first parameter from the second color space. The method further includes determining at least one of the candidate images to be a possible match to the desired object based on the comparison.
    • 提供了分类物体电子彩色图像的系统和方法。 一种方法包括接收对象的输入表示,所述表示包括在第一颜色空间中定义的像素,将输入图像转换为第二颜色空间,确定包括与输入表示的颜色相关联的多个参数的查询特征向量,查询 特征向量参数,其包括第一颜色空间的至少第一参数和第二颜色空间的至少第一参数,并将查询特征向量与多个候选特征向量进行比较。 每个候选特征向量包括与多个存储的候选图像的颜色相关联的多个参数,候选特征向量参数至少包括来自第一颜色空间的第一参数和至少来自第二颜色空间的第一参数。 该方法还包括基于该比较来确定候选图像中的至少一个是与期望对象的可能匹配。
    • 4. 发明授权
    • Automatic configuration of devices upon introduction into a networked environment
    • 引入到网络环境后自动配置设备
    • US08375210B2
    • 2013-02-12
    • US13234141
    • 2011-09-15
    • Greg Miller
    • Greg Miller
    • H04L9/32
    • H04L67/125G06F21/305G06F21/43G06F21/6272G06F21/73G06F21/85G06F2221/2105G06F2221/2107H04L63/0428H04L63/061H04L67/14
    • Automatic configuration of devices upon introduction into a networked environment, can be implemented, for example, by having a device randomly generate a series of letters and/or numbers, e.g., generate a PIN (Personal Identification Number) that encodes temporary credentials that, in addition to proving ownership and/or control over the device by virtue of having access to the PIN, also allows creating a temporary secure communication channel based on the PIN over which permanent security credentials may be transferred to the device to facilitate provisioning it to securely communicate in the networked environment. In a wireless scenario, a unique SSID and encryption key (WEP or WPA) may be determined as a function of the PIN, where both the device and its access point utilize the PIN to establish a temporary secure communication channel. Various techniques may be used to establish ownership and/or control over the device to prevent inadvertent association of the device with a wrong networked environment.
    • 例如,通过使设备随机生成一系列字母和/或数字,例如生成编码临时凭证的PIN(个人识别号码),可以实现在引入到网络环境中后自动配置设备 除了通过访问PIN来证明对设备的所有权和/或控制之外,还允许基于PIN创建临时安全通信信道,通过该PIN,永久性安全凭证可以被传送到设备以便于将其提供给安全地通信 在网络环境中。 在无线场景中,唯一的SSID和加密密钥(WEP或WPA)可以被确定为PIN的函数,其中设备及其接入点都使用PIN建立临时安全通信信道。 可以使用各种技术来建立对设备的所有权和/或控制,以防止设备与错误的联网环境的无意的关联。
    • 5. 发明申请
    • AUTOMATIC CONFIGURATION OF DEVICES UPON INTRODUCTION INTO A NETWORKED ENVIRONMENT
    • 引入到网络环境中的设备的自动配置
    • US20120005478A1
    • 2012-01-05
    • US13234141
    • 2011-09-15
    • Greg Miller
    • Greg Miller
    • H04L9/32
    • H04L67/125G06F21/305G06F21/43G06F21/6272G06F21/73G06F21/85G06F2221/2105G06F2221/2107H04L63/0428H04L63/061H04L67/14
    • Automatic configuration of devices upon introduction into a networked environment, can be implemented, for example, by having a device randomly generate a series of letters and/or numbers, e.g., generate a PIN (Personal Identification Number) that encodes temporary credentials that, in addition to proving ownership and/or control over the device by virtue of having access to the PIN, also allows creating a temporary secure communication channel based on the PIN over which permanent security credentials may be transferred to the device to facilitate provisioning it to securely communicate in the networked environment. In a wireless scenario, a unique SSID and encryption key (WEP or WPA) may be determined as a function of the PIN, where both the device and its access point utilize the PIN to establish a temporary secure communication channel. Various techniques may be used to establish ownership and/or control over the device to prevent inadvertent association of the device with a wrong networked environment.
    • 例如,通过使设备随机生成一系列字母和/或数字,例如生成编码临时凭证的PIN(个人识别号码),可以实现在引入到网络环境中后自动配置设备 除了通过访问PIN来证明对设备的所有权和/或控制之外,还允许基于PIN创建临时安全通信信道,通过该PIN,永久性安全凭证可以被传送到设备以便于将其提供给安全地通信 在网络环境中。 在无线场景中,唯一的SSID和加密密钥(WEP或WPA)可以被确定为PIN的函数,其中设备及其接入点都使用PIN建立临时安全通信信道。 可以使用各种技术来建立对设备的所有权和/或控制,以防止设备与错误的联网环境的无意的关联。
    • 6. 发明授权
    • Method for firmware variable storage with eager compression, fail-safe extraction and restart time compression scan
    • 固件变量存储方法,具有急切压缩,故障安全提取和重启时间压缩扫描
    • US07934209B2
    • 2011-04-26
    • US10561049
    • 2004-05-26
    • Vincent ZimmerMichael RothmanGreg MillerMark Doran
    • Vincent ZimmerMichael RothmanGreg MillerMark Doran
    • G06F9/44
    • G06F9/4401H03M7/30
    • Firmware-based conversion methods for storing converted firmware variables in a firmware storage device, such as flash memory. Under one method, “eager” compression of firmware is performed. In response to a storage request, a determination is made to whether a compressor is available. If it is, the firmware variable is stored in a compressed form in the storage device; if not, the firmware variable is stored in an uncompressed form. In response to a read request for a stored firmware variable, a determination is made to whether the variable is stored in a compressed or uncompressed form. If it is compressed, a decompressor is employed to return the variable to its uncompressed form prior to providing it to the requestor; already uncompressed variables are provided directly to the requester. An application program interface is provided to enable operating system runtime access to the firmware variables. Similar conversions may be employed separately or in parallel, including encryption.
    • 用于将转换的固件变量存储在诸如闪存的固件存储设备中的基于固件的转换方法。 在一种方法下,执行固件的“急切”压缩。 响应于存储请求,确定压缩机是否可用。 如果是,固件变量以压缩形式存储在存储设备中; 如果没有,则固件变量以未压缩形式存储。 响应对存储的固件变量的读取请求,确定变量是以压缩形式还是未压缩形式存储。 如果它被压缩,则使用解压缩器在将变量提供给请求者之前将其变为未压缩的形式; 已经将未压缩的变量直接提供给请求者。 提供一个应用程序接口,以使操作系统运行时访问固件变量。 类似的转换可以单独或并行使用,包括加密。
    • 8. 发明授权
    • System and method for a planner
    • 计划员的系统和方法
    • US07822628B2
    • 2010-10-26
    • US10440521
    • 2003-05-16
    • Jeffrey BradyKevin McMurtryGreg Miller
    • Jeffrey BradyKevin McMurtryGreg Miller
    • G06F9/46
    • G06Q10/10G06Q10/0631G06Q10/06311G06Q10/06313
    • A planning system and method is disclosed. The planning system includes at least one business rule remote from at least one client, a meeting editor, and at least one tracker communicatively connected to the meeting editor, wherein the at least one tracker tracks at least two data items selected from the group consisting of invitees to at least one of the at least one meetings, respondents to invitations to the meeting, at least one speaker of the meeting, at least one host of the meeting, finances of the meeting, and a venue of the meeting, and wherein the at least one tracker communicates the at least two data items with the meeting editor.
    • 公开了一种规划系统和方法。 规划系统包括至少一个远离至少一个客户端的业务规则,会议编辑器以及通信地连接到会议编辑器的至少一个跟踪器,其中所述至少一个跟踪器跟踪从由以下组成的组中选择的至少两个数据项: 邀请至少一个会议中的至少一个,对会议的邀请的答复者,至少一个会议发言人,至少一个会议主持人,会议的财务和会议的地点,并且其中 至少一个跟踪器与会议编辑器通信所述至少两个数据项。