Ontology-based data access monitoring
    2.
    发明授权
    Ontology-based data access monitoring 有权
    基于本体的数据访问监控

    公开(公告)号:US09558261B2

    公开(公告)日:2017-01-31

    申请号:US15092229

    申请日:2016-04-06

    Inventor: Daqi Li Jun Fang

    Abstract: Technologies are generally described for methods and systems effective to monitor a data access activity. In some examples, a method may include receiving, by a processor, a destination concept. The processor may identify a set of concepts, which may include the destination concept and at least one related concept associated with the destination concept, in an ontology. The processor may generate a planned path, which may define a first data access order associated with access of at least one of the related concepts and the destination concept, using the set of concepts. The processor may generate a browsing path which may define a second data access order associated with the data access activity. The processor may compare the planned path with the browsing path. The processor may determine a deviation based on the comparison of the planned path and the browsing path. The processor may monitor the data access activity using the deviation.

    Abstract translation: 一般来说,对有效监视数据访问活动的方法和系统描述技术。 在一些示例中,方法可以包括由处理器接收目的地概念。 处理器可以在本体中识别一组概念,其可以包括目的地概念和与目的地概念相关联的至少一个相关概念。 处理器可以生成计划路径,其可以使用该组概念来定义与至少一个相关概念和目的地概念的访问相关联的第一数据访问顺序。 处理器可以生成可以定义与数据访问活动相关联的第二数据访问顺序的浏览路径。 处理器可以将计划的路径与浏览路径进行比较。 处理器可以基于计划路径和浏览路径的比较来确定偏差。 处理器可以使用偏差监视数据访问活动。

    Composite image generation to remove obscuring objects
    3.
    发明授权
    Composite image generation to remove obscuring objects 有权
    复合图像生成,以消除模糊对象

    公开(公告)号:US09406114B2

    公开(公告)日:2016-08-02

    申请号:US14428244

    申请日:2014-02-18

    Inventor: Daqi Li Jun Fang

    Abstract: Technologies are generally described for methods and systems effective to generate a composite image. The methods may include receiving first image data that includes object data corresponding to an object and receiving second image data that includes obscuring data. The obscuring data, if displayed on a display, may obscure at least a portion of the. The methods may also include identifying a first region that may include the object data, in the first image data. The methods may also include identifying a second region, that may include the obscuring data, in the second image data. The methods may also include replacing at least part of the second region with at least part of the first region to generate the composite image data that may include at least some of the object data. The methods may also include displaying the composite image on a display.

    Abstract translation: 通常描述有效生成合成图像的方法和系统的技术。 所述方法可以包括接收包括与对象相对应的对象数据的第一图像数据,以及接收包括模糊数据的第二图像数据。 模糊数据(如果显示在显示器上)可能会模糊至少一部分。 所述方法还可以包括在第一图像数据中识别可包括对象数据的第一区域。 所述方法还可以包括在第二图像数据中识别可包括遮蔽数据的第二区域。 所述方法还可以包括用至少部分第一区域替换第二区域的至少一部分,以生成可包括至少一些目标数据的合成图像数据。 所述方法还可以包括在显示器上显示合成图像。

    ONTOLOGY-BASED DATA ACCESS MONITORING
    5.
    发明申请
    ONTOLOGY-BASED DATA ACCESS MONITORING 有权
    基于民族的数据访问监控

    公开(公告)号:US20150317322A1

    公开(公告)日:2015-11-05

    申请号:US14439898

    申请日:2014-05-05

    Inventor: Daqi Li Jun Fang

    Abstract: Technologies are generally described for methods and systems effective to monitor a data access activity. In some examples, a method may include receiving, by a processor, a destination concept. The processor may identify a set of concepts, which may include the destination concept and at least one related concept associated with the destination concept, in an ontology. The processor may generate a planned path, which may define a first data access order associated with access of at least one of the related concepts and the destination concept, using the set of concepts. The processor may generate a browsing path which may define a second data access order associated with the data access activity. The processor may compare the planned path with the browsing path. The processor may determine a deviation based on the comparison of the planned path and the browsing path. The processor may monitor the data access activity using the deviation.

    Abstract translation: 一般来说,对有效监视数据访问活动的方法和系统描述技术。 在一些示例中,方法可以包括由处理器接收目的地概念。 处理器可以在本体中识别一组概念,其可以包括目的地概念和与目的地概念相关联的至少一个相关概念。 处理器可以生成计划路径,其可以使用该组概念来定义与至少一个相关概念和目的地概念的访问相关联的第一数据访问顺序。 处理器可以生成可以定义与数据访问活动相关联的第二数据访问顺序的浏览路径。 处理器可以将计划的路径与浏览路径进行比较。 处理器可以基于计划路径和浏览路径的比较来确定偏差。 处理器可以使用偏差监视数据访问活动。

    DEGREE OF CLOSENESS BASED ON COMMUNICATION CONTENTS
    6.
    发明申请
    DEGREE OF CLOSENESS BASED ON COMMUNICATION CONTENTS 有权
    基于通信内容的离散程度

    公开(公告)号:US20150193684A1

    公开(公告)日:2015-07-09

    申请号:US14122971

    申请日:2012-11-20

    Inventor: Daqi Li Jun Fang

    CPC classification number: G06N5/04 G06F17/30964

    Abstract: In one example, a method may include monitoring contents of communications between a first user and a second user, determining a degree of closeness between the first user and the second user utilizing an ontological model, with the degree of closeness being based at least in part on the contents of communications between the first user and the second user, and updating the degree of closeness based at least in part on a frequency of communications between the first user and the second user.

    Abstract translation: 在一个示例中,方法可以包括监视第一用户和第二用户之间的通信内容,使用本体论模型确定第一用户和第二用户之间的亲密度,其中亲密程度至少部分地基于 关于第一用户和第二用户之间的通信内容,以及至少部分地基于第一用户和第二用户之间的通信频率来更新亲密度。

    Proxy service facilitation
    8.
    发明授权

    公开(公告)号:US09967357B2

    公开(公告)日:2018-05-08

    申请号:US14648001

    申请日:2014-03-06

    Inventor: Daqi Li Jun Fang

    CPC classification number: H04L67/2838 G06F17/30864 G06Q50/01

    Abstract: A proxy requestor, who is expected to participate in events hosted on a computing network, may hope to find a proxy to handle the events for the proxy requestor. The proxy requestor, using a requestor device, may submit a request for such proxy to a proxy service provider during or prior to the event. In some examples, the proxy service provider may transmit one or more candidate proxies to the requestor device. Once the proxy requestor device selects a proxy from among the one or more candidate proxies, the requestor device may either facilitate or schedule a connection between the selected proxy and other participants of the events.

    AUTOMATIC CONTACTS SORTING
    10.
    发明申请
    AUTOMATIC CONTACTS SORTING 有权
    自动联系人

    公开(公告)号:US20160248895A1

    公开(公告)日:2016-08-25

    申请号:US14409530

    申请日:2013-09-17

    Inventor: Daqi Li Jun Fang

    Abstract: To automatically sort multiple contacts of a user, in some examples, a system may be configured to monitor physiological signals, which reflect the emotional responses, of the user during communications between the user and his/her contacts and, further, to classify the contacts into multiple contact groups that may be sorted by the emotional responses of the user.

    Abstract translation: 为了自动对用户的多个联系人进行排序,在一些示例中,可以将系统配置为在用户和他/她的联系人之间的通信期间监视用户的反映情绪反应的生理信号,并且进一步分类联系人 分成可以由用户的情绪反应排序的多个联系人组。

Patent Agency Ranking