会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • ILLUMINATION FOR FACE RECOGNITION
    • 用于脸部识别的照明
    • WO2004029861A1
    • 2004-04-08
    • PCT/AU2003/001261
    • 2003-09-24
    • BIOMETIX PTY LTDDUNSTONE, Edward, SimonLESTIDEAU, FabriceTAN, Teewoon
    • DUNSTONE, Edward, SimonLESTIDEAU, FabriceTAN, Teewoon
    • G06K9/00
    • G06K9/2036G06K9/00221
    • The performance-degrading effects of unfavourable environmental lighting on face recognition systems can be assessed and quantified using a camera system operatively connected to a computer system. An assessment can be reported to the user via an appropriate output device, or stored in a storage medium for later use. The assessed lighting can then be used to alleviate the effects of unfavourable lighting conditions using one or more controllable light sources (120) that form part of a controllable lighting system. The controllable light sources (120) are located in a distributed manner relative to a camera (125), and are oriented to illuminate a subject viewed by the camera (125). An image of the subject is captured by the camera (125) and supplied to a computer system or other computing hardware. The computer system is in turn connected to a power distributor for controlling the power supplied to the controllable light sources (120).
    • 可以使用可操作地连接到计算机系统的相机系统来评估和量化不利的环境照明对人脸识别系统的性能降低的影响。 评估可以通过适当的输出设备报告给用户,或者存储在存储介质中供以后使用。 然后可以使用所评估的照明来使用构成可控照明系统的一部分的一个或多个可控光源(120)来减轻不利照明条件的影响。 可控光源(120)相对于照相机(125)以分布的方式定位,并且被定向为照亮由照相机(125)观看的被摄体。 被摄物体的图像被照相机(125)捕获并提供给计算机系统或其他计算硬件。 计算机系统又连接到电力分配器,用于控制供应到可控光源(120)的电力。
    • 4. 发明申请
    • SYSTEM AND METHOD FOR CONTROLLABLY CONCEALING DATA FROM SPYING APPLICATIONS
    • 用于控制数据从应用程序控制的系统和方法
    • WO2007006072A1
    • 2007-01-18
    • PCT/AU2006/000379
    • 2006-03-21
    • TAN, Teewoon
    • TAN, Teewoon
    • H04L9/00G06F13/00
    • G06F21/606G06F21/82H04L9/0656H04L2209/16H04L2209/56
    • A method for use in controllably concealing an input data that has been entered into a computer system via an input device, from being comprehended by a spying application during transportation of the input data across a communication link of the computer system, the method including the steps of: (i) encrypting the input data when the input data is being processed at a relatively low level within the computer system so as to form an encrypted input data; (ii) thereafter, transporting the encrypted input data across the communication link; (iii) thereafter, providing a device for decrypting the encrypted input data so as to obtain a decrypted input data; (iv) selectively providing access to the decrypted input data by at least one authorised software application operably connected to the computer system.
    • 一种用于可控制地隐藏已经通过输入装置输入到计算机系统的输入数据的方法,在输入数据在计算机系统的通信链路的传输期间被异常应用程序所理解,该方法包括步骤 (i)当所述输入数据在所述计算机系统内处于相对较低的水平时加密所述输入数据,以便形成加密的输入数据; (ii)之后,通过所述通信链路传送加密的输入数据; (iii)此后,提供用于解密加密的输入数据以便获得解密的输入数据的设备; (iv)通过可操作地连接到所述计算机系统的至少一个授权的软件应用选择性地提供对所解密的输入数据的访问。