会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • AUTOMATIC PHOTOGRAPHY
    • 自动摄影
    • WO2003032629A1
    • 2003-04-17
    • PCT/GB2002/004458
    • 2002-10-01
    • HEWLETT-PACKARD COMPANYGROSVENOR, David, Arthur
    • GROSVENOR, David, Arthur
    • H04N5/232
    • H04N5/77G10L15/26H04N5/232
    • In automatic photographic or electronic camera apparatus, sounds from a predetermined person are preferentially received or identified to provide an audio signal which is then used to produce a saliency signal (11) (indicative of the person's response to circumstances) to control the camera 1 or an image signal (2, 6) produced therefrom. The sounds may be detected by a sound conduction microphone (4), e.g. on the head or throat of the person, or by voice identification circuitry used with a less specific microphone not necessarily mounted on the person. The person may or may not be wearing the camera. Control may be in real time, or the sound or saliency signal may be recorded (3) together with an image signal for subsequent control (7) of the latter. The audio signal may be categorised by waveform analysis, e.g. for the recognition of sounds such as speech (word recognition and/or prosody) or non-speech vocal sounds, and/or non-vocal sounds; signal amplitude may also be taken into account.
    • 在自动摄影或电子照相机装置中,优先接收或识别来自预定人物的声音以提供音频信号,然后使用该音频信号产生指示人对环境的响应以控制照相机1或图像信号2的显着信号11 6。 声音可以由传声麦克风4检测,例如, 在人的头部或喉头上,或者通过语音识别电路与不太一般地安装在人身上的较不具体的麦克风一起使用。 该人可能有也可能不会戴着相机。 控制可以是实时的,或者声音或显着信号可以与图像信号一起被记录3,用于后者的后续控制7。 音频信号可以通过波形分析来分类。 用于识别诸如语音字识别和/或韵律或非语音声音的声音,和/或非声音信号幅度也可以被考虑。
    • 7. 发明申请
    • NETWORK ADAPTER MANAGEMENT
    • 网络适​​配器管理
    • WO2002061553A1
    • 2002-08-08
    • PCT/GB2002/000416
    • 2002-01-29
    • HEWLETT-PACKARD COMPANYCHOO, Tse, Huong
    • CHOO, Tse, Huong
    • G06F1/00
    • G06F21/50G06F9/468G06F21/62
    • An operating system comprising a kernel (100) incorporating mandatory access controls as a means to counter the effects posed by application compromise. The operating system uses a technique known as "containment" to at least limit the scope of damage when security breaches occur. In a preferred embodiment, each application supported by the operating system, is assigned a tag or label, each tag or label being indicative of a logically protected computing environment or "compartment", and applications having the same tag or label belonging to the same compartment. By default, only applications running in the same compartment can communicate with each other. Access control rules define very narrow tightly-controlled communications paths between compartments.
    • 一种操作系统,包括一个包含强制访问控制的内核(100),作为对付由应用程序妥协产生的影响的手段。 操作系统使用称为“遏制”的技术至少限制了安全漏洞发生时的损害范围。 在优选实施例中,由操作系统支持的每个应用程序被分配标签或标签,每个标签或标签指示逻辑保护的计算环境或“隔间”,以及具有属于相同隔间的相同标签或标签的应用 。 默认情况下,只有运行在同一个隔离专区中的应用程序可以相互通信。 访问控制规则在隔间之间定义非常窄的紧密控制的通信路径。