TECHNOLOGIES FOR DEPTH-BASED USER AUTHENTICATION
    11.
    发明申请
    TECHNOLOGIES FOR DEPTH-BASED USER AUTHENTICATION 审中-公开
    基于深度用户认证的技术

    公开(公告)号:US20160378968A1

    公开(公告)日:2016-12-29

    申请号:US14752858

    申请日:2015-06-27

    CPC classification number: G06F21/36 H04W12/06 H04W12/08

    Abstract: Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.

    Abstract translation: 用于基于深度的用户认证的技术包括移动计算设备,用于在移动计算设备的显示器上显示包括深度信道的登录图像。 移动计算设备确定由移动计算设备的用户做出的登录图像的多个对象的选择,基于由用户选择的多个对象中的每个对象的相对深度生成用户选择的密码, 并且响应于用户选择的密码与设备登录密码匹配的确定,允许对移动计算设备的访问。

    Handling repeated requests for the same user data
    13.
    发明授权
    Handling repeated requests for the same user data 有权
    处理对同一用户数据的重复请求

    公开(公告)号:US09177173B2

    公开(公告)日:2015-11-03

    申请号:US13718212

    申请日:2012-12-18

    Abstract: In accordance with some embodiments, data may be automatically provided on preordained conditions for specific types of data. Thus specific types of data or specific requestors may be treated differently. The system may be programmed to respond appropriately to requests for certain types of data from certain types of requestors. This offloads the need to review specific requests in many cases and enables an automated system for providing requested data as appropriate.

    Abstract translation: 根据一些实施例,可以针对特定类型的数据的预先条件自动提供数据。 因此,特定类型的数据或特定请求者可以被不同地对待。 系统可以被编程为适当地响应来自某些类型的请求者的某些类型的数据的请求。 这在很多情况下不需要审查具体的请求,并且使自动化系统适当地提供所请求的数据。

    Memory allocation for virtual machines using memory map
    14.
    发明授权
    Memory allocation for virtual machines using memory map 有权
    使用内存映射的虚拟机的内存分配

    公开(公告)号:US09015523B2

    公开(公告)日:2015-04-21

    申请号:US13722499

    申请日:2012-12-20

    Abstract: Apparatuses and methods associated with memory allocations for virtual machines are disclosed. In embodiments, an apparatus may include a processor; a plurality of memory modules; and a memory controller configured to provide a layout of the memory modules. The apparatus may further include a VMM configured to be operated by the processor to manage execution of a VM by the processor including selective allocation of the memory modules to the VM using the layout of the memory modules provided to the VMM by the memory controller. Other embodiments may be described and claimed.

    Abstract translation: 公开了与虚拟机的存储器分配相关联的装置和方法。 在实施例中,装置可以包括处理器; 多个存储器模块; 以及存储器控制器,被配置为提供所述存储器模块的布局。 该设备可以进一步包括被配置为由处理器操作以管理由处理器执行VM的VMM,包括使用由存储器控制器提供给VMM的存储器模块的布局来将存储器模块选择性地分配给VM。 可以描述和要求保护其他实施例。

    COMPUTER VISION ASSISTED ITEM SEARCH

    公开(公告)号:US20220335640A1

    公开(公告)日:2022-10-20

    申请号:US17855250

    申请日:2022-06-30

    Abstract: System and techniques for computer vision assisted item search are described herein. A composite image, including visual data and depth data, may be obtained. The composite image may be filtered to isolate a clothing article represented in the composite image. A classifier may be applied to the depth data to produce a set of clothing attributes for the clothing article. The clothing attributes may then be provided to a remote device.

    Technologies for depth-based user authentication

    公开(公告)号:US10402554B2

    公开(公告)日:2019-09-03

    申请号:US14752858

    申请日:2015-06-27

    Abstract: Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.

Patent Agency Ranking