会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • SYSTEM AND METHOD FOR CONTROLLING SCANNING PLANES OF IMAGING DEVICE
    • 用于控制成像装置扫描平面的系统和方法
    • US20130132024A1
    • 2013-05-23
    • US13636545
    • 2010-06-25
    • Lei ZhaoWei WeiHuagen Liu
    • Lei ZhaoWei WeiHuagen Liu
    • G01C5/00G06F17/00
    • G01C5/00A61B6/035A61B6/12A61B7/003A61B8/0841A61B17/00A61B2017/00207A61B2034/2055G06F17/00
    • This patent indicates a type of system and method for controlling scanning planes of imaging device, it comprises: tracer, on which a tracer coordinate system is built, is fixed on the target which is to be scanned; a tracking device, on which a tracking device coordinate system is built, is used to get the position and orientation of the tracer in the tracking device coordinate system and convert the known position and orientation of the target which is to be scanned from the tracer coordinate system to the tracking device coordinate system; an imaging device, on which an imaging device coordinate system is built, is used to scan the position and orientation of the said target to be scanned in the imaging device coordinate system to form images; a conversion module, which is preset in the tracking device or the imaging device, is used to convert the position and orientation of the target which is to be scanned from the tracking device coordinate system to the imaging device coordinate system; when the conversion module is preset in the tracking device, the tracking device transfers the position and orientation of the target which is to be scanned in the tracking device coordinate system to the imaging device. This patent has the ability to provide high efficiency, and high precision when scanning target image, it can be used at any type of image devices.
    • 该专利指出了一种用于控制成像装置的扫描平面的系统和方法,其包括:示踪器,在其上构建示踪器坐标系,固定在待扫描的目标上; 使用其上构建跟踪装置坐标系的跟踪装置来获得跟踪装置坐标系中的示踪器的位置和取向,并且从跟踪坐标转换要扫描的目标的已知位置和取向 系统到跟踪装置坐标系; 使用其上构建有成像装置坐标系的成像装置,以在成像装置坐标系中扫描要扫描的所述目标的位置和取向,以形成图像; 将预设在跟踪装置或成像装置中的转换模块用于将待扫描的目标的位置和取向从跟踪装置坐标系转换成成像装置坐标系; 当在跟踪装置中预设转换模块时,跟踪装置将要在跟踪装置坐标系中扫描的目标的位置和方位传送到成像装置。 该专利能够在扫描目标图像时提供高效率和高精度,可用于任何类型的图像设备。
    • 13. 发明授权
    • Method and provider edge device for advertising and processing pseudo-wire information
    • 用于广告和处理伪线信息的方法和提供者边缘设备
    • US08023506B2
    • 2011-09-20
    • US12373862
    • 2008-04-25
    • Wei Wei
    • Wei Wei
    • H04L12/28
    • H04L12/4641H04L45/10H04L45/245H04L45/50H04L45/66H04L45/68Y02D50/30
    • The present invention discloses a method for advertising and processing pseudo-wire (PW) information, which comprises: the sending provider edge (PE) device using two or more methods to group PWs, identifying the group identifier assigned to each PW with each grouping method, and sending all group identifiers of each PW to the receiving PE device; the sending PE device sending to the receiving PE device the notification message that carries information identifying the affected PW group, and the receiving PE device identifying the PWs belonging to the affected PW group according to the received notification. The present invention also discloses the sending and receiving PE devices for advertising and processing PW information. The method and the devices of the present invention can support grouping PWs with more than one method, allowing for flexible use of PW group-based messaging and message processing.
    • 本发明公开了一种广播和处理伪线(PW)信息的方法,包括:使用两种或多种方式对PW进行分组的发送提供商边缘(PE)设备,用分组方法识别分配给每个PW的组标识符 并将每个PW的所有组标识符发送给接收PE设备; 发送PE设备向接收PE设备发送携带识别受影响的PW组的信息的通知消息,以及根据接收到的通知来标识属于受影响的PW组的PW的接收PE设备。 本发明还公开了发送和接收用于广告和处理PW信息的PE设备。 本发明的方法和设备可以通过多种方式支持对PW进行分组,从而允许灵活使用基于PW组的消息和消息处理。
    • 19. 发明申请
    • METHOD FOR ESTABLISHING A TRUSTED RUNNING ENVIRONMENT IN THE COMPUTER
    • 在计算机中建立有害运行环境的方法
    • US20090288161A1
    • 2009-11-19
    • US11720640
    • 2005-07-11
    • Wei WeiChaoran PengPing YinYonghua Liu
    • Wei WeiChaoran PengPing YinYonghua Liu
    • G06F11/00
    • G06F21/52G06F21/57
    • The present invention discloses a method for establishing a trusted running environment in a computer. A trusted file authentication module and a trusted process memory code authentication module are preset in operation system (OS) of the computer and a secured OS is loaded and run. The trusted file authentication module intercepts all file operation behaviors, checks whether current file to be operated is a trusted file or not, and processes the file according to its operation type if it is trusted, otherwise processes the file after its eligibility is verified; the trusted process memory code authentication module authenticates on timing whether the running state and the integrality for all process code are normal or not; if any process is abnormal, giving an alarm, saving field data run by the process and closing down the process; otherwise continuing to run normally. With this invention, the security for the running environment in the computer can be ensured whether the attack from known or unknown virus exists or not, and this facilitates application and reduces implementation cost.
    • 本发明公开了一种在计算机中建立受信任运行环境的方法。 在计算机的操作系统(OS)中预设了可信文件认证模块和可信过程存储器代码认证模块,并且加载并运行安全操作系统。 可信文件认证模块拦截所有文件操作行为,检查当前操作的文件是否为可信文件,如果文件信任,则根据操作类型处理该文件,否则在验证文件资格后处理文件; 信任过程存储器代码认证模块根据定时验证所有处理代码的运行状态和完整性是否正常; 如果任何进程异常,发出报警,保存进程运行的现场数据并关闭进程; 否则继续正常运行。 利用本发明,可以确保计算机中的运行环境的安全性是否存在来自已知或未知病毒的攻击,并且这有助于应用并降低实施成本。