会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Binaural signal processing system and method
    • 双耳信号处理系统及方法
    • US06222927B1
    • 2001-04-24
    • US08666757
    • 1996-06-19
    • Albert S. FengCharissa R. LansingChen LiuWilliam O'BrienBruce C. Wheeler
    • Albert S. FengCharissa R. LansingChen LiuWilliam O'BrienBruce C. Wheeler
    • H04B1500
    • H04R25/552H04R25/407H04S1/007
    • A desired acoustic signal is extracted from a noisy environment by generating a signal representative of the desired signal with a processor for a hearing aid device. The processor receives binaural signals from two microphones at different locations. The binaural inputs to the processor are converted from analog to digital format and then submitted to a discrete Fourier transform process to generate discrete spectral signal representations. The spectral signals are delayed by a number of time intervals in a dual delay line to provide a number of intermediate signals, each corresponding to a different position relative to a desired signal source. Location of the noise source is determined and the spectral content of the desired signal is determined from the intermediate signal corresponding to the noise source location. Inverse transformation of the selected intermediate signal followed by digital to analog conversion provides an output signal representative of the desired signal.
    • 通过用助听器装置的处理器生成表示期望信号的信号,从有噪声的环境中提取期望的声信号。 处理器从不同位置的两个麦克风接收双耳信号。 处理器的双耳输入从模拟转换为数字格式,然后提交到离散傅立叶变换处理以产生离散的频谱信号表示。 频谱信号在双延迟线中延迟多个时间间隔以提供多个中间信号,每个中间信号对应于相对于期望信号源的不同位置。 确定噪声源的位置,并根据对应于噪声源位置的中间信号确定期望信号的频谱含量。 所选择的中间信号的逆变换随后进行数模转换,提供代表期望信号的输出信号。
    • 5. 发明申请
    • Security access device and method
    • 安全访问设备和方法
    • US20060123463A1
    • 2006-06-08
    • US11002077
    • 2004-12-03
    • Tet YeapLou DafuWilliam O'Brien
    • Tet YeapLou DafuWilliam O'Brien
    • H04L9/32
    • G06F21/35G07C9/00039G07C9/00111G07C9/00309H04L9/3226H04L9/3263H04L2209/805
    • A security system and method is provided. An embodiment includes a security access device that includes a first transmitter for transmitting authentication to a computer and a second transmitter for transmitting verification information to a computer. The first transmitter is typically active and consumes power from the access device, while the second transmitter is typically passive, and consumes less or nil power from the access device. When the security access device is initially brought proximal to the computer and activated, the authentication information is sent to the computer and the user is logged in. Periodically, the computer will query the passive transmitter for verification information, to ensure that the security access device is still proximal to the computer.
    • 提供了一种安全系统和方法。 一个实施例包括安全访问设备,其包括用于向计算机发送认证的第一发送器和用于向计算机发送验证信息的第二发送器。 第一发射机通常是有源的,并且从接入设备消耗功率,而第二发射机通常是无源的,并且消耗来自接入设备的较少或零的功率。 当安全访问设备最初靠近计算机并被激活时,认证信息被发送到计算机并且用户登录。计算机将周期性地查询被动发射机的验证信息,以确保安全接入设备 仍然靠近电脑。
    • 6. 发明申请
    • System and method for access control
    • 用于访问控制的系统和方法
    • US20060080534A1
    • 2006-04-13
    • US11002315
    • 2004-12-03
    • Tet YeapDafu LouWilliam O'Brien
    • Tet YeapDafu LouWilliam O'Brien
    • H04L9/00
    • H04L63/0823G06F21/33H04W12/06H04W12/08
    • A system and method for access control is provided. In one embodiment, a system includes a computing device connected to an access server that controls the ability of the computing device to access to a computing resource, such as the Internet. The access server connects to an activation server via a network. The activation server is operable to receive a request for to generate a certificate for the computing device from the activation server. The activation server is operable to generate the certificate and embed a unique identifier of the computing device and/or the access server and/or the like inside the certificate. Once generated, the certificate is installed in the computing device. When the computing device initiates a request to access the computing resource, the computing device initially sends the certificate to the access server. If the certificate received by the access server does not include the expected unique identifier(s), then access to the computing resource is prevented and/or restricted. If the key received by the access server includes the expected unique identifier(s), then access to the computing resource is permitted.
    • 提供了一种用于访问控制的系统和方法。 在一个实施例中,系统包括连接到访问服务器的计算设备,其控制计算设备访问诸如因特网之类的计算资源的能力。 访问服务器通过网络连接到激活服务器。 激活服务器可操作以从激活服务器接收用于为计算设备生成证书的请求。 激活服务器可操作以生成证书并且在证书内嵌入计算设备和/或访问服务器等的唯一标识符。 一旦生成,证书就安装在计算设备中。 当计算设备发起访问计算资源的请求时,计算设备最初将该证书发送到接入服务器。 如果由接入服务器接收到的证书不包括预期的唯一标识符,则防止和/或限制对计算资源的访问。 如果由接入服务器接收到的密钥包括预期的唯一标识符,则允许访问计算资源。