会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明申请
    • QR CODE DETECTION
    • QR码检测
    • US20110290882A1
    • 2011-12-01
    • US12790125
    • 2010-05-28
    • Zhiwei GuMatthew R. ScottGang ChenJonathan Y. Tien
    • Zhiwei GuMatthew R. ScottGang ChenJonathan Y. Tien
    • G06K7/10
    • G06K7/1456
    • One or more techniques and/or systems are disclosed for detecting a quick response (QR) code. An area of an image comprising a QR code is localized by combining pixel dynamic scale (DS), black-cell ratio (BR), and edge intensity sum (EIS) criteria determination to identify the QR code. A pattern for the QR code is detected, comprising determining if a position detection pattern (PDP) is located in respective grid areas of a first grid that comprises the QR code, and identifying an alignment pattern (AP), if present. To identify the AP, an AP region is estimated using the PDPs, and a center area of the AP is found by examining respective areas of a second grid comprising the estimated AP region.
    • 公开了用于检测快速响应(QR)代码的一个或多个技术和/或系统。 包括QR码的图像的区域通过组合像素动态尺度(DS),黑色单元比(BR)和边缘强度和(EIS)标准确定来识别QR码来定位。 检测QR码的图案,包括确定位置检测图案(PDP)是否位于包括QR码的第一格栅的相应网格区域中,以及如果存在则识别对准图案(AP)。 为了识别AP,使用PDP估计AP区域,并且通过检查包括估计的AP区域的第二网格的相应区域来找到AP的中心区域。
    • 52. 发明授权
    • Portable secured computing environment for performing online confidential transactions in untrusted computers
    • 便携式安全计算环境,用于在不受信任的计算机中执行联机机密事务
    • US08024790B2
    • 2011-09-20
    • US11786099
    • 2007-04-11
    • Xiaoming ZhaoGang ChenHeather Xing
    • Xiaoming ZhaoGang ChenHeather Xing
    • G06F21/00H04L29/06
    • G06F9/45537G06F21/57G06F21/575
    • A portable secured computing environment for performing online confidential transactions in an untrusted host computer. The secured computing environment may be loaded from a portable storage device, such as a USB stick, plugged into a peripheral port of the host computer. The secured computing environment may include a virtual machine running under a host operating system of the host computer. A secured operating system may be running in the virtual machine. An online application, such as a web browser in communication with an online service, may be run under the secured operating system. Operation of the online application may be restricted by a security profile. For example, the online application may only access network addresses specifically indicated in a whitelist of the security profile.
    • 用于在不受信任的主机中执行联机机密事务的便携式安全计算环境。 安全的计算环境可以从插入主计算机的外围端口的诸如USB棒的便携式存储设备加载。 安全的计算环境可以包括在主计算机的主机操作系统下运行的虚拟机。 安全的操作系统可能在虚拟机中运行。 诸如与在线服务通信的网络浏览器的在线应用可以在安全操作系统下运行。 在线应用程序的操作可能受到安全配置文件的限制。 例如,在线应用程序可能仅访问安全配置文件的白名单中明确指定的网络地址。
    • 53. 发明授权
    • Fault dictionaries for integrated circuit yield and quality analysis methods and systems
    • 集成电路产品和质量分析方法和系统的故障字典
    • US07987442B2
    • 2011-07-26
    • US11221394
    • 2005-09-06
    • Janusz RajskiGang ChenMartin KeimNagesh TamarapalliManish SharmaHuaxing Tang
    • Janusz RajskiGang ChenMartin KeimNagesh TamarapalliManish SharmaHuaxing Tang
    • G06F17/50G06F9/455G06F11/00
    • G06F11/2273G01R31/01G01R31/2846G01R31/2853G01R31/2894G01R31/31704G01R31/31835
    • Methods, apparatus, and systems for testing, analyzing, and improving integrated circuit yield and quality are disclosed herein. For example, in one exemplary embodiment, one or more fault dictionaries are generated for identifying one or more defect candidates from corresponding observation point combinations. In this exemplary method, the observation point combinations indicate the observation points of a circuit-under-test that captured faulty test values upon application of a respective test pattern. Further, the one or more fault dictionaries in one embodiment are generated by: (a) for a first defect candidate, storing one or more first indicators indicative of test patterns detecting the first defect candidate, and (b) for a second defect candidate, storing at least a second indicator indicative of the test patterns that detect the second defect candidate, the second indicator comprising a bit mask that indicates which of the test patterns detecting the first defect candidate also detect the second defect candidate.
    • 本文公开了用于测试,分析和提高集成电路产量和质量的方法,装置和系统。 例如,在一个示例性实施例中,生成用于从相应的观察点组合识别一个或多个缺陷候选的一个或多个故障字典。 在该示例性方法中,观察点组合表示在应用相应测试图案时捕获故障测试值的被测电路的观察点。 此外,一个实施例中的一个或多个故障字典通过以下方式产生:(a)对于第一缺陷候选,存储指示检测第一缺陷候选的测试图案的一个或多个第一指示符,以及(b)对于第二缺陷候选, 存储指示检测第二缺陷候选的测试图案的至少第二指示符,第二指示符包括指示检测第一缺陷候选的哪个测试图案还检测第二缺陷候选的位掩码。
    • 56. 发明申请
    • PAYMENT WORKFLOW EXTENSIBILITY FOR POINT-OF-SALE APPLICATIONS
    • 支付点销售应用的支付工作流程可扩展性
    • US20110055033A1
    • 2011-03-03
    • US12548435
    • 2009-08-27
    • Gang ChenBalaji BalasubramanianDmitry V. BelikovHimanshu Lal
    • Gang ChenBalaji BalasubramanianDmitry V. BelikovHimanshu Lal
    • G06Q20/00
    • G06Q20/40G06Q20/20G06Q20/206G07G1/14
    • Architecture that employs a software development kit and an add-in model to collect payment data and communicate with payment processors in a point-of-sale (POS) application to meet new requirements in new markets. Data gathered from an add-in and from the POS application can be combined and then communicated to the payment processor. The payment method can be determined and payment processing routed to different payment processors based on data and schema of data collected is also described. An add-in can also programmatically obtain information from the POS application information about a transaction and authorize a payment. A payment collecting/processing API is the interface between the POS application tender logic and payment collecting/processing logic and defines how a payment collecting/processing add-in interacts with the POS application.
    • 架构采用软件开发工具包和附加模型来收集支付数据并与销售点(POS)应用程序中的支付处理器进行通信,以满足新市场的新需求。 从加载项和POS应用程序收集的数据可以组合,然后传送到支付处理器。 还描述了支付方法,并且还描述了基于收集的数据和模式的支付处理路由到不同支付处理器。 加载项还可以以编程方式从POS应用程序获取关于交易的信息并授权付款。 付款收集/处理API是POS应用程序招标逻辑和支付收集/处理逻辑之间的接口,并定义了付款收集/处理加载项如何与POS应用程序交互。
    • 57. 发明授权
    • Isolation of binding proteins with high affinity to ligands
    • 结合蛋白与配体的高亲和力分离
    • US07871796B2
    • 2011-01-18
    • US11461757
    • 2006-08-01
    • Gang ChenAndrew HayhurstJeffrey G. ThomasBrent L. IversonGeorge Georgiou
    • Gang ChenAndrew HayhurstJeffrey G. ThomasBrent L. IversonGeorge Georgiou
    • C12P21/06C07H21/04
    • C12N15/1034
    • The invention overcomes the deficiencies of the prior art by providing a rapid approach for isolating binding proteins capable of binding small molecules and peptides via “display-less” library screening. In the technique, libraries of candidate binding proteins, such as antibody sequences, are expressed in soluble form in the periplasmic space of gram negative bacteria, such as Escherichia coli, and are mixed with a labeled ligand. In clones expressing recombinant polypeptides with affinity for the ligand, the concentration of the labeled ligand bound to the binding protein is increased and allows the cells to be isolated from the rest of the library. Where fluorescent labeling of the target ligand is used, cells may be isolated by fluorescence activated cell sorting (FACS). The approach is more rapid than prior art methods and avoids problems associated with the surface-expression of ligand fusion proteins employed with phage display.
    • 本发明通过提供通过“无显示”文库筛选分离能够结合小分子和肽的结合蛋白的快速方法来克服现有技术的缺陷。 在该技术中,候选结合蛋白(例如抗体序列)的文库以可溶形式表达在革兰氏阴性细菌如大肠杆菌的周质空间中,并与标记的配体混合。 在表达对配体具有亲和性的重组多肽的克隆中,与结合蛋白结合的标记配体的浓度增加,并允许细胞与文库的其余部分分离。 当使用靶配体的荧光标记时,可以通过荧光激活细胞分选(FACS)分离细胞。 该方法比现有技术方法更快速,并避免与噬菌体展示所用配体融合蛋白的表面表达相关的问题。
    • 59. 发明授权
    • Scheduled gateway scanning arrangement and methods thereof
    • 计划网关扫描布置及其方法
    • US07836502B1
    • 2010-11-16
    • US11773072
    • 2007-07-03
    • Xiaoming ZhaoGang ChenEric Chang
    • Xiaoming ZhaoGang ChenEric Chang
    • G06F11/00H04L9/32
    • H04L63/145G06F21/6218H04L63/1416
    • A method for performing content analysis of a plurality of resources is provided. The method includes performing background content scanning on the plurality of resources based on a resource priority queue. The method also includes storing already scanned resources of the plurality of resources in a scan result database. The method further includes receiving a first access request asynchronously with the scanning and the storing. The method yet also includes, if the first access request pertains to a given resource not contemporaneously designated as a satisfactory scan result according to the scan result database, granting the given resource a higher priority in the resource priority queue than resources remaining to be scanned in the plurality of resources, thereby enabling the given resource to be scanned ahead of the resources remaining to be scanned.
    • 提供了一种用于执行多个资源的内容分析的方法。 该方法包括基于资源优先级队列对多个资源进行后台内容扫描。 该方法还包括将已经扫描的多个资源的资源存储在扫描结果数据库中。 该方法还包括与扫描和存储异步地接收第一访问请求。 该方法还包括如果第一访问请求与根据扫描结果数据库不同时被指定为令人满意的扫描结果的给定资源相关,则给予资源在资源优先级队列中比待扫描的资源更高的优先级 多个资源,从而使给定的资源能够在剩余待扫描的资源之前被扫描。