会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明授权
    • Fingerprint verification
    • 指纹验证
    • US07046829B2
    • 2006-05-16
    • US09872423
    • 2001-05-30
    • Raghavendra U UdupaGaurav GargPramod Kumar Sharma
    • Raghavendra U UdupaGaurav GargPramod Kumar Sharma
    • G06K9/00
    • G06K9/00087
    • Fingerprint verification matching a claimant fingerprint with one of a number of recorded enrollee fingerprints uses various adaptations of model alignment techniques involving affine transformation to provide an algorithm providing relatively fast and accurate verification suitable for realtime applications. These techniques involve sampling minutiae into subsets based on geometrical proximity to a particular index minutiae for each subset, eliminating minutiae which are near the fingerprint boundary, ordering the minutiae of each subset in a predetermined manner, classifying each subset in bins which discriminate on the properties of the subsets, checking transformations proposed as matches between fingerprints for consistency with each other, and checking the topological as well as the geometrical correspondence of potentially matching fingerprints. In a preferred form, a score indicative of the correlation between fingerprints is used to ultimately decide whether the fingerprints match.
    • 将索赔指纹与许多记录的登记指纹之一相匹配的指纹验证使用涉及仿射变换的模型对准技术的各种适应性来提供一种提供适合于实时应用的相对快速且准确的验证的算法。 这些技术包括基于每个子集的特定索引细节的几何接近度将细节抽样到子集中,消除靠近指纹边界的细节,以预定方式对每个子集的细节进行排序,对每个子集进行分类,区分特征 的子集,检查提取的指纹之间的匹配以便彼此一致,以及检查潜在匹配指纹的拓扑以及几何对应关系。 在优选形式中,使用指示指纹之间的相关性的分数来最终确定指纹是否匹配。
    • 24. 发明授权
    • Performance of a stride-based prefetcher on an out-of-order processing unit (CPU)
    • 基于步幅的预取器在无序中央处理单元(CPU)上的性能
    • US08949522B1
    • 2015-02-03
    • US13165736
    • 2011-06-21
    • Gaurav GargDavid T. Hass
    • Gaurav GargDavid T. Hass
    • G06F13/00
    • G06F13/385
    • Systems, apparatusses, and methods are disclosed for improving performance of a stride-based prefetcher on an out-of-order central processing unit (CPU). The present disclosure teaches a processor system that employs out-of-order stride prefetch units. The out-of-order stride prefetch units are utilized for issuing prefetches for out-of-order stride access patterns. In one or more embodiments, the out-of-order stride prefetch units examine the offsets between past virtual address (VA) accesses and the directions of the past VA accesses in order to generate an estimate of the underlying VA access stride of the executed program code (PC). In at least one embodiment, the out-of-order stride prefetch units use the estimate of the VA access stride in order to generate a prediction of future VA accesses. In some embodiments, after the out-of-order stride prefetch units have generated the prediction of future VA accesses, the out-of-order stride prefetch units prefetch the predicted future VA accesses.
    • 公开了用于改善无序中央处理单元(CPU)上的基于步长的预取器的性能的系统,装置和方法。 本公开教导了采用无序步长预取单元的处理器系统。 无序步幅预取单元用于发出无序步进访问模式的预取。 在一个或多个实施例中,无序步长预取单元检查过去虚拟地址(VA)访问与过去VA访问的方向之间的偏移量,以便生成执行程序的基本VA访问步幅的估计 代码(PC)。 在至少一个实施例中,无序步长预取单元使用VA访问步幅的估计,以便生成将来VA访问的预测。 在一些实施例中,在无序步幅预取单元已经产生未来VA访问的预测之后,无序步幅预取单元预取预测的未来VA访问。
    • 25. 发明授权
    • Data privacy for smart services
    • 智能服务的数据隐私
    • US08910296B2
    • 2014-12-09
    • US13286177
    • 2011-10-31
    • Ammar RayesSubrata DasguptaGaurav GargMark Whitteker
    • Ammar RayesSubrata DasguptaGaurav GargMark Whitteker
    • G06F21/00H04L12/26H04L29/06H04L12/24
    • H04L63/0414H04L41/0213H04L41/28H04L43/04
    • Techniques are disclosed for hiding sensitive information from a provider of support services. In one embodiment, a first network device determines that network device information includes non-sensitive data and sensitive data. In response to the determining, the first network device generates mapping data that maps dummy information to the sensitive data. The first network device generates output data that comprises the non-sensitive data and the dummy data and sends the output data to a second network device. In other embodiments, the user may select the network parameters that are sensitive. The first network device may also receive first report data from the second network device that identifies a network problem and includes the dummy data and generate second report data by using the mapping data to replace the dummy information with the sensitive data.
    • 公开了隐藏来自支持服务提供商的敏感信息的技术。 在一个实施例中,第一网络设备确定网络设备信息包括非敏感数据和敏感数据。 响应于确定,第一网络设备生成将虚拟信息映射到敏感数据的映射数据。 第一网络设备生成包括非敏感数据和伪数据的输出数据,并将输出数据发送到第二网络设备。 在其他实施例中,用户可以选择敏感的网络参数。 第一网络设备还可以从第二网络设备接收识别网络问题的第一报告数据,并且包括虚拟数据,并且通过使用映射数据生成第二报告数据以用敏感数据替换虚拟信息。