会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • PAYMENT APPLICATION WITH MERCHANT PHYSICAL LOCATION PERSONALIZATION
    • 付款申请与商业物理位置个人化
    • US20150066742A1
    • 2015-03-05
    • US14015010
    • 2013-08-30
    • Geoffrey W. ChattertonDavid GoodRamaneek KhannaTim Nichols
    • Geoffrey W. ChattertonDavid GoodRamaneek KhannaTim Nichols
    • G06Q20/32G06Q20/10
    • G06Q20/3224G06Q20/10G06Q20/20G06Q20/322H04W4/023H04W4/33
    • Systems and methods for providing a payment application personalized for a merchant physical location include receiving a first customer location from a first customer device that is running a payment application. A first merchant physical location is then determined to be associated with the first customer location and, in response, first merchant physical location personalization information is retrieved. The first merchant physical location personalization information is then provided for display as a user interface on at least one personalized merchant physical location screen that is provided on the first customer device using the payment application. The at least one personalized merchant physical location screen is configured to send an instruction to the payment application provider device to make a payment from a first customer account associated with the first customer to a first merchant account associated with the first merchant physical location.
    • 用于提供针对商家物理位置个性化的支付应用的系统和方法包括从正在运行支付应用的第一客户设备接收第一客户位置。 然后确定第一商户物理位置与第一客户位置相关联,作为响应,检索第一商户物理位置个性化信息。 然后,第一商户物理位置个性化信息被提供用于在使用支付应用在第一客户设备上提供的至少一个个性化商家物理位置屏幕上显示为用户界面。 所述至少一个个性化商户物理位置屏幕被配置为向所述支付应用提供商设备发送指令,以从与所述第一客户相关联的第一客户账户到与所述第一商家物理位置相关联的第一商户账户进行支付。
    • 4. 发明申请
    • SYSTEMS AND METHODS FOR CONFIGURING MOBILE DEVICES FOR PRINTING TO WIRELESS PRINTERS
    • 用于配置移动设备的系统和方法,用于打印无线打印机
    • US20120075664A1
    • 2012-03-29
    • US12960740
    • 2010-12-06
    • Timothy C. NicholsGeoffrey W. ChattertonRamaneek KhannaEric D. BauswellAnthony R. Chvala
    • Timothy C. NicholsGeoffrey W. ChattertonRamaneek KhannaEric D. BauswellAnthony R. Chvala
    • G06F3/12
    • G06F3/1204G06F3/1228G06F3/1292
    • The present disclosure is directed to systems and methods for configuring mobile communication devices to identify and communicate with wireless printing devices. These systems and methods may include determining available wireless printing devices, selecting a desired wireless printing device, attempting to establish communication between the mobile communication device and the wireless printing device using a first communication protocol, prompting a user to indicate the successfulness of the first communication protocol, and configuring the mobile communication device for printing to the wireless printing device using the first communication protocol if the first communication protocol successfully communicated with the wireless printing device. The systems and methods may further include prompting the user to indicate that the first communication protocol was not successful if the first communication protocol did not successfully communicate with the wireless printing device and repeating the method using another available communication protocol.
    • 本公开涉及用于配置移动通信设备以识别和与无线打印设备通信的系统和方法。 这些系统和方法可以包括确定可用的无线打印设备,选择所需的无线打印设备,尝试使用第一通信协议在移动通信设备和无线打印设备之间建立通信,促使用户指示第一通信的成功 并且如果第一通信协议与无线打印设备成功通信,则使用第一通信协议将移动通信设备配置为用于打印到无线打印设备。 所述系统和方法还可以包括:如果第一通信协议没有成功地与无线打印设备通信并且使用另一可用通信协议重复该方法,则提示用户指示第一通信协议不成功。
    • 5. 发明授权
    • System, method and computer readable medium of efficiently decoding an
AC-3 bitstream by precalculating computationally expensive values to be
used in the decoding algorithm
    • 通过预先计算要在解码算法中使用的计算昂贵的值来有效地解码AC-3比特流的系统,方法和计算机可读介质
    • US5970461A
    • 1999-10-19
    • US772703
    • 1996-12-23
    • Geoffrey W. Chatterton
    • Geoffrey W. Chatterton
    • G10L19/02G06K9/36
    • G10L19/0212
    • A method and system for providing an inverse transform for an audio compression decoding algorithm in software precalculates a plurality of identified values; each of which is computationally intensive. The method and system then performs a pre-inverse transform complex multiply utilizing a first portion of the identified values and an array of input coefficients to provide a plurality of intermediate values. Thereafter, an inverse transform complex multiply and a post inverse transform multiply are combined to provide a combined complex multiply operation. The combined complex multiply operation uses a second portion of the identified values and the intermediate values provides the inverse transform. Accordingly, through the use of the present invention, the number of instructions for implementing the inverse transform can be substantially minimized. In the prior art, the method for performing the inverse discrete cosine transform (IDCT) in the AC-3 algorithm is extremely inefficient for software decoder implementations. Through the use of the present invention, the algorithm performance on a superscalar processor as measured by issued instructions is improved by a factor on the order of 43.
    • 用于为软件中的音频压缩解码算法提供逆变换的方法和系统预先计算多个识别的值; 每个都是计算密集型的。 该方法和系统然后利用所识别的值的第一部分和输入系数的阵列来执行预逆变换复数乘法,以提供多个中间值。 此后,将逆变换复乘和后逆变换乘法组合以提供组合复乘法运算。 复合乘法运算使用识别值的第二部分,中间值提供逆变换。 因此,通过使用本发明,用于实现逆变换的指令的数量可以基本上最小化。 在现有技术中,用于在AC-3算法中执行逆离散余弦变换(IDCT)的方法对于软件解码器实现来说是非常低效的。 通过使用本发明,通过发布的指令测量的超标量处理器上的算法性能通过43的数量被改善。
    • 9. 发明申请
    • AUTHENTICATION SYSTEM
    • 认证系统
    • US20150066762A1
    • 2015-03-05
    • US14012753
    • 2013-08-28
    • Geoffrey W. ChattertonRamaneek KhannaTimothy C. Nichols
    • Geoffrey W. ChattertonRamaneek KhannaTimothy C. Nichols
    • G06Q20/40
    • G06F21/44G06F21/45G06Q20/322G06Q20/3224G06Q20/40G06Q20/40145G06Q20/42
    • Systems and methods for providing authentication include receiving an authentication passcode input through an input device of a user device from a first user. The first user is authenticated in response to the authentication passcode input matching at least one user authentication passcode in a database, and an authentication time period is associated with the authentication of the first user and allows the first user access to at least one application on the user device. A plurality of authentication factors are then detected using the user device, and plurality of authentication factors are not an authentication passcode input received through the input device. The plurality of authentication factors are then determined to match the at least one authentication profile in the database and, in response, the authentication time period is extended such that the first user is allowed continued access to the at least one application on the user device.
    • 用于提供认证的系统和方法包括从第一用户接收通过用户设备的输入设备输入的认证密码。 第一用户响应于与数据库中的至少一个用户认证密码相匹配的认证密码输入进行认证,并且认证时间段与第一用户的认证相关联,并允许第一用户访问至少一个应用 用户设备。 然后使用用户设备检测多个认证因素,并且多个认证因素不是通过输入设备接收的认证密码输入。 然后确定多个认证因素以匹配数据库中的至少一个认证简档,并且作为响应,扩展认证时间段,使得允许第一用户对用户设备上的至少一个应用的持续访问。
    • 10. 发明申请
    • Rendering Changed Portions of Composited Images
    • 渲染更换部分合成图像
    • US20130300763A1
    • 2013-11-14
    • US13943595
    • 2013-07-16
    • Arthur Anthonie Van HoffGeoffrey W. Chatterton
    • Arthur Anthonie Van HoffGeoffrey W. Chatterton
    • G06T11/60
    • G06T11/60G06T15/005G09G5/393G09G2360/127
    • Rendering graphics on a display of a device. In a portable or wireless device, a list of instructions needed to refresh or generate a frame is first created. The created instructions are then parsed or optimized to remove instructions that result in unnecessary processing instructions. The optimized list is then executed. During generation of a given frame, a view hierarchy is traversed to identify damaged portions of a display. The damaged portions are not copied to the frame. Also, information that has not changed is likewise not usually copied. Damage from the previous frame less damage from the current frame is copied to the appropriate buffer. The instructions are optimized to render only the portion of the frame that is necessary. Portions of the display that are not visible are not traversed in the view hierarchy and are not considered until visible on the display.
    • 在显示设备上渲染图形。 在便携式或无线设备中,首先创建刷新或生成帧所需的指令列表。 然后对创建的指令进行解析或优化,以删除导致不必要的处理指令的指令。 然后执行优化的列表。 在给定帧的生成期间,遍历视图层次以识别显示器的损坏部分。 损坏的部分不会复制到框架。 而且,还没有改变的信息通常不被复制。 来自前一帧的伤害较小的伤害从当前帧复制到适当的缓冲区。 这些指令被优化以仅渲染所需的框架部分。 不可见的显示部分不会在视图层次结构中遍历,直到在显示器上可见时才被视为。