会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • IMAGE ANALYSIS METHOD AND APPARATUS IN A NETWORK THAT IS STRUCTURED WITH MULTIPLE LAYERS AND DIFFERENTIALLY WEIGHTED NEURONS
    • 网络中的图像分析方法和设备,其结构与多层和差分加权神经元
    • WO2005033911A2
    • 2005-04-14
    • PCT/US2004/005691
    • 2004-02-26
    • WALKER DIGITAL, LLCTEDESCO, Daniel, E.JORASCH, James, A.GELMAN, Geoffrey, M.WALKER, Jay, S.TULLEY, Stephen, C.O'NEILL, Vincent, M.ALDERUCCI, Dean, P.
    • TEDESCO, Daniel, E.JORASCH, James, A.GELMAN, Geoffrey, M.WALKER, Jay, S.TULLEY, Stephen, C.O'NEILL, Vincent, M.ALDERUCCI, Dean, P.
    • G06F
    • H04L67/12G06F17/30256G06F17/30259G08B13/19641G08B13/19656G08B13/19663G08B13/19673G08B13/1968H04L63/08
    • Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians "log on" to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of "no-man" zones - areas where no humans or vehicles should be present or monitored - are sent to Guardians for a simple determination of whether or not a human exists in the picture. Site owners compensate the operator of the computer system for this monitoring service, and the operator in turn compensates Guardians based on, for example, (i) the amount of time spent monitoring, and/or (ii) the degree of a given Guardian's responsiveness to real or fabricated security breaches. Among other things, systems and methods are disclosed herein for facilitating (a) the registration of monitored sites, (b) the registration of Guardians, and (c) the management of monitoring sessions, including the routing of real and fabricated images to Guardians, the rating of Guardians, and the compensation of Guardians. Many additional and alternative embodiments are contemplated, including the following example of one embodiment.
    • 这里公开的是用于促进在线劳动力的使用以远程监视安全敏感站点并报告潜在安全漏洞的系统和方法。 在一些实施例中,照相机被配置为监测关键的民用基础设施,例如供水和核反应堆。 相机可操作地连接到中央计算机或一系列计算机,并且由相机拍摄的图像被传送到中央计算机。 最初向中央电脑注册后,监护人“登录”到中央电脑主办的中央网站,监控图像,从而获得赔偿。 在一个实施例中,“无人”区域 - 不存在或监视人或车辆的区域的图像被发送给监护人以简单确定图像中是否存在人类。 网站所有者对计算机系统的运营商进行补偿,用于此监控服务,而运营商又根据(i)监控时间量和/或(ii)给定的监护人的响应程度来补偿监护人 实际或制造安全漏洞。 除此之外,本文还公开了系统和方法,以便于(a)监控站点的注册,(b)监护人的注册,(c)管理监控会话,包括将真实和制造的映像路由到监护人, 监护人的评级和监护人的赔偿。 涵盖了许多附加和替代实施例,包括一个实施例的以下示例。