会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • SYSTEM AND METHOD USED FOR CONFIGURATION OF AN INSPECTION COMPLIANCE TOOL WITH MACHINE READABLE TAGS AND THEIR ASSOCIATIONS TO INSPECTED COMPONENTS
    • 用于使用机器可读标签配置检查符合性工具的系统和方法及其与检查组件的协议
    • US20110173127A1
    • 2011-07-14
    • US12684802
    • 2010-01-08
    • Albert HoMarc SiegelChristopher TossingAdam IerymenkoDaniar Hussain
    • Albert HoMarc SiegelChristopher TossingAdam IerymenkoDaniar Hussain
    • G06Q10/00
    • G06Q10/00G05B19/409G05B19/418G06Q10/08G06Q30/018G06Q50/28Y02P90/02Y02P90/10
    • The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database. Disclosed here is a method for configuring a project having one or more installation of assets for use with an industrial inspection compliance system, including the steps of (a) defining an installation and storage area for the project; (b) assigning the assets uniquely into the one or more installation or storage area; (c) segmenting each asset into components; (d) assigning logical inspection points for the project, installations, and the assets; (e) defining inspection criteria for each logical inspection point; (f) assigning tag locations for a machine-readable tag having a unique serial number at or near each logical inspection point; (g) capturing a media sample of each logical inspection point; (h) capturing location coordinates for each logical inspection point; and (i) requiring the collection of data such as a unique machine-readable tag serial number, media sample, location coordinates, and an encrypted security signature to confirm that the inspection actions actually occurred.
    • 本发明涉及使用手持设备和远程数据库的检查系统和顺应性验证系统的配置。 这里公开了一种用于配置具有一个或多个用于工业检验合规系统的资产安装的项目的方法,包括以下步骤:(a)定义项目的安装和存储区域; (b)将资产分配给一个或多个安装或存储区域; (c)将每项资产分成组成部分; (d)为项目,设施和资产分配逻辑检查点; (e)定义每个逻辑检查点的检查标准; (f)在每个逻辑检查点处或附近为具有唯一序列号的机器可读标签分配标签位置; (g)捕获每个逻辑检查点的媒体样本; (h)捕获每个逻辑检查点的位置坐标; 和(i)要求收集诸如唯一的机器可读标签序列号,媒体样本,位置坐标和加密安全签名之类的数据,以确认检查动作实际发生。
    • 3. 发明授权
    • System and method used for configuration of an inspection compliance tool with machine readable tags and their associations to inspected components
    • 用于配置具有机器可读标签的检查合规性工具及其与检查组件的关联的系统和方法
    • US07793850B1
    • 2010-09-14
    • US12723674
    • 2010-03-14
    • Albert HoMarc SiegelChristopher TossingAdam IerymenkoDaniar Hussain
    • Albert HoMarc SiegelChristopher TossingAdam IerymenkoDaniar Hussain
    • G06F19/00G06K19/06
    • G06Q10/08
    • The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database. Disclosed here is a method for configuring a project having one or more installation of assets for use with an industrial inspection compliance system, including the steps of (a) defining an installation and storage area for the project; (b) assigning the assets uniquely into the one or more installation or storage area; (c) segmenting each asset into components; (d) assigning logical inspection points for the project, installations, and the assets; (e) defining inspection criteria for each logical inspection point; (f) assigning tag locations for a machine-readable tag having a unique serial number at or near each logical inspection point; (g) capturing a media sample of each logical inspection point; (h) capturing location coordinates for each logical inspection point; and (i) requiring the collection of data such as a unique machine-readable tag serial number, media sample, location coordinates, and an encrypted security signature to confirm that the inspection actions actually occurred.
    • 本发明涉及使用手持设备和远程数据库的检查系统和顺应性验证系统的配置。 这里公开了一种用于配置具有一个或多个用于工业检验合规系统的资产安装的项目的方法,包括以下步骤:(a)定义项目的安装和存储区域; (b)将资产分配给一个或多个安装或存储区域; (c)将每项资产分成组成部分; (d)为项目,设施和资产分配逻辑检查点; (e)定义每个逻辑检查点的检查标准; (f)在每个逻辑检查点处或附近为具有唯一序列号的机器可读标签分配标签位置; (g)捕获每个逻辑检查点的媒体样本; (h)捕获每个逻辑检查点的位置坐标; 和(i)要求收集诸如唯一的机器可读标签序列号,媒体样本,位置坐标和加密安全签名之类的数据,以确认检查动作实际发生。
    • 8. 发明授权
    • System and method for generating quotations from a reference document on a touch sensitive display device
    • 用于在触敏显示设备上从参考文档生成报价的系统和方法
    • US07971140B2
    • 2011-06-28
    • US12832903
    • 2010-07-08
    • Marc SiegelAlbert HoChristopher Tossing
    • Marc SiegelAlbert HoChristopher Tossing
    • G06F17/24
    • G06F3/04883G06Q10/0637G06Q10/087G06Q10/103G06Q30/018Y02P80/21
    • The present invention is a system and method for generating quotations from a reference document on a touch sensitive display device or other handheld device, including the following steps: (a) receiving a first input from a user designating a first point in a captured image of the reference document to define a first corner of a crop rectangle; (b) receiving a second input from the user designating a second point in the captured image to define a second corner of the crop rectangle, wherein the first input is released before the second input is initiated; (c) cropping the captured image from the first point to the second point of the crop rectangle when the second input is released to generate an image quotation; and (f) generating a quotation data object comprising the image quotation and a bibliographical reference to a referenced section of the reference document which contains the image quotation. After the image quotation has been cropped, it may be annotated using a similar two-touch method. The present invention may be used in smart phones such as Apple iPhones®, or industrial hand-held devices that inspectors may use to quote reference documents, and in other purposes.
    • 本发明是一种用于在触摸敏感显示设备或其他手持设备上从参考文档生成报价的系统和方法,包括以下步骤:(a)从用户接收指定拍摄图像中的第一点的第一输入 参考文档定义作物矩形的第一个角; (b)从所述用户接收指定所述捕获图像中的第二点的第二输入以定义所述裁剪矩形的第二角,其中在所述第二输入被启动之前所述第一输入被释放; (c)当释放所述第二输入以产生图像报价时,将所捕获的图像从所述第一点裁剪到所述裁剪矩形的第二点; 和(f)生成包括图像报价的报价数据对象以及包含图像报价的参考文献的引用部分的参考文献。 在裁剪图像报价后,可以使用类似的双触摸方法注释。 本发明可以用于诸如Apple iPhones的智能电话或者检查员可以用来引用参考文献的工业手持设备以及其他目的。
    • 9. 发明申请
    • SYSTEM AND METHOD FOR CROPPING AND ANNOTATING IMAGES ON A TOUCH SENSITIVE DISPLAY DEVICE
    • 用于在触摸敏感显示装置上拍摄和提取图像的系统和方法
    • US20100194781A1
    • 2010-08-05
    • US12767077
    • 2010-04-26
    • Christopher TossingMarc SiegelAlbert Ho
    • Christopher TossingMarc SiegelAlbert Ho
    • G09G5/00
    • G06F3/04883G06Q10/0637G06Q10/087G06Q10/103G06Q30/018Y02P80/21
    • The present invention is a system and method for cropping and annotating images on a touch sensitive display device or other handheld device, including the following steps: (a) displaying an image of the image file to be cropped/annotated; (b) receiving an first input from a user designating a first point in the image defining a corner of a crop/annotation rectangle; (c) receiving a second input from the user designating a second point in the image defining an opposite corner of the crop/annotation rectangle; and (d) cropping and/or annotating the image from the first point to the second point of the crop/annotation rectangle. The present invention may be used in digital cameras, Apple iPhones®, hand-held devices that inspectors may use to annotate photographs taken to substantiate statements of problems found during industrial inspections, and for other purposes.
    • 本发明是一种用于在触摸敏感显示设备或其他手持设备上裁剪和注释图像的系统和方法,包括以下步骤:(a)显示要裁剪/注释的图像文件的图像; (b)从用户接收指定所述图像中定义作物/注释矩形的角的第一点的第一输入; (c)从所述用户接收指定所述图像中定义所述裁剪/注释矩形的相对角的第二点的第二输入; 和(d)裁剪和/或注释图像从裁剪/注释矩形的第一点到第二点。 本发明可以用于数码相机,AppleiPhones®,手持式装置,检查员可以使用手动装置来注释拍摄的照片,以证实在工业检查期间发现的问题的陈述以及用于其他目的。
    • 10. 发明申请
    • SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS
    • 用于检测IP网络安全漏洞的系统,方法和设备
    • US20100262688A1
    • 2010-10-14
    • US12689141
    • 2010-01-18
    • Daniar HussainMarc Siegel
    • Daniar HussainMarc Siegel
    • G06F21/00G06F11/30H04L29/06G06F15/173G06N5/02
    • H04L63/1433G06F2221/0737G06F2221/2101G06F2221/2145H04L63/1458H04L63/1466
    • This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack; and (3) Spoofing Attack. A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint of the IP device or its configuration settings, a watermark inserted in the data-stream, and a private key burned into the IP devices' physical memory may be used to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.
    • 本发明是用于检测构成基于IP的网络的IP设备的折中的系统,方法和装置。 一个实施例是在以下条件下检测和警报的方法:(1)拒绝服务攻击; (2)未经授权的使用攻击; 和(3)欺骗攻击。 可以使用IP设备上运行的服务,历史基准数据和跟踪路由信息进行调查,以检测可能的拒绝服务攻击。 可以使用详细的日志分析和被动DNS折衷系统来检测可能的未经授权的使用。 最后,可以使用IP设备的指纹或其配置设置,插入到数据流中的水印以及被烧录到IP设备的物理存储器中的私钥来检测可能的欺骗攻击。 本发明可以用于帮助减轻IP网络中的入侵和漏洞。