Increased Quality of Image Objects Based on Depth in Scene
    271.
    发明申请
    Increased Quality of Image Objects Based on Depth in Scene 有权
    基于场景深度提高图像对象质量

    公开(公告)号:US20140233802A1

    公开(公告)日:2014-08-21

    申请号:US14264921

    申请日:2014-04-29

    Abstract: Systems, methods, and software for operating an image processing system are provided herein. In a first example, a method of operating an image processing system is provided. The method includes identifying object pixels associated with an object of interest in a scene, identifying additional pixels to associate with the object of interest, and performing an operation based on a depth of the object in the scene on target pixels comprised of the object pixels and the additional pixels to change a quality of the object of interest.

    Abstract translation: 本文提供了用于操作图像处理系统的系统,方法和软件。 在第一示例中,提供了一种操作图像处理系统的方法。 该方法包括识别与场景中的感兴趣对象相关联的对象像素,识别与感兴趣对象相关联的附加像素,以及基于由对象像素组成的目标像素上的场景中的对象的深度来执行操作,以及 附加像素来改变感兴趣对象的质量。

    SYSTEM AND METHOD FOR IDENTIFYING CONTACTS OF A TARGET USER IN A SOCIAL NETWORK
    272.
    发明申请
    SYSTEM AND METHOD FOR IDENTIFYING CONTACTS OF A TARGET USER IN A SOCIAL NETWORK 有权
    用于识别目标用户在社交网络中的联系的系统和方法

    公开(公告)号:US20140229406A1

    公开(公告)日:2014-08-14

    申请号:US14065505

    申请日:2013-10-29

    Abstract: When using Web intelligence (“Webint”) to collect information regarding a target social network user, one of the most valuable pieces of information is the target user's List-Of-Friends (LOF). In some cases, however, the LOF of the target user is not accessible in his profile. Herein are described methods and systems for identifying the LOF of a target user. An analysis system crawls the profiles of social network users, other than the target user, and reconstructs the LOF of the target user from the crawled profiles.

    Abstract translation: 当使用Web Intelligence(“Webint”)收集关于目标社交网络用户的信息时,最有价值的信息之一是目标用户的“List of Of Friends”(LOF)。 然而,在某些情况下,目标用户的LOF在他的配置文件中是不可访问的。 这里描述了用于识别目标用户的LOF的方法和系统。 分析系统抓取目标用户以外的社交网络用户的配置文件,并从爬网的配置文件重建目标用户的LOF。

    SYSTEM AND METHOD FOR BIT-MAP BASED KEYWORD SPOTTING IN COMMUNICATION TRAFFIC
    273.
    发明申请
    SYSTEM AND METHOD FOR BIT-MAP BASED KEYWORD SPOTTING IN COMMUNICATION TRAFFIC 有权
    用于基于位图的关键字在通信交通中的点播系统和方法

    公开(公告)号:US20140222852A1

    公开(公告)日:2014-08-07

    申请号:US14167074

    申请日:2014-01-29

    Inventor: Yishay Yitshak

    CPC classification number: G06F17/30985 H04L63/0245 H04L63/1408

    Abstract: Methods and systems for locating occurrences of a search pattern in a body of text. A processor searches the text for one or more occurrences of a pattern. Both the text and the pattern comprise symbols of some alphabet. In preparation for the search, the processor defines a respective bit-map for each alphabet symbol. Using the bit-maps, the processor carries out a highly efficient process of searching the text for occurrences of the pattern. The processor then scans the pattern backwards using the bit-maps, symbol by symbol, attempting to match the symbols of the pattern to the corresponding symbols of the text. If a match is not found, the processor calculates the size of the jump to the next position in the text based on the accumulated results of the evaluations up to the current position.

    Abstract translation: 用于定位文本正文中搜索模式的出现的方法和系统。 处理器在文本中搜索一个或多个模式的出现。 文本和图案都包含一些字母表的符号。 为了准备搜索,处理器为每个字母符号定义相应的位图。 使用位映射,处理器执行高效的搜索文本发生模式的过程。 然后,处理器使用比特映射向后扫描图案,按照符号,尝试将图案的符号与文本的对应符号相匹配。 如果没有找到匹配项,则处理器根据评估的累积结果计算到文本中下一个位置的跳转大小,直到当前位置。

    TIME-IN-STORE ESTIMATION USING FACIAL RECOGNITION
    274.
    发明申请
    TIME-IN-STORE ESTIMATION USING FACIAL RECOGNITION 有权
    使用面部识别的时间存储估计

    公开(公告)号:US20140161316A1

    公开(公告)日:2014-06-12

    申请号:US14104099

    申请日:2013-12-12

    Abstract: A method of monitoring the amount of time spent in a specified area by an individual comprises employing a first camera to automatically create one or more entrance images, each entrance image containing a face of an entering individual that passes a first location, and storing each entrance image in a database along with a corresponding entrance time that the entering individual passed the entrance location. A second camera is also employed to automatically create an exit image of a face of an exiting individual that passes a second location, and the exit image is recorded along with the corresponding exit time that the exiting individual passed the exit location. The exit image is then compared to the entrance images in the database to identify a matching entrance image containing the same face as the exit image. A stay time is then determined for the exiting individual by determining the difference between the entrance time corresponding to the matching entrance image and the exit time.

    Abstract translation: 监视由个人在指定区域中花费的时间量的方法包括采用第一相机自动创建一个或多个入口图像,每个入口图像包含通过第一位置的进入个体的面部,并存储每个入口 数据库中的图像以及进入的个人通过入口位置的相应入口时间。 还使用第二相机来自动创建通过第二位置的退出个体的面部的退出图像,并且退出图像与退出的个体通过出口位置的对应退出时间一起被记录。 然后将出口图像与数据库中的入口图像进行比较,以识别包含与出口图像相同的面部的匹配入口图像。 然后通过确定与匹配入口图像相对应的入口时间与出口时间之间的差异来确定退出个体的逗留时间。

    Irregular Event Detection in Push Notifications
    275.
    发明申请
    Irregular Event Detection in Push Notifications 有权
    推送通知中的不规则事件检测

    公开(公告)号:US20140161315A1

    公开(公告)日:2014-06-12

    申请号:US14100895

    申请日:2013-12-09

    Abstract: Systems and methods of detecting irregular events include the extraction of values for measure in each of a plurality of notifications. The extracted values are stored in a measures database and a distribution is calculated for the values of each of the measures. The extracted values are compared to the calculated distributions to determine if an irregular event has occurred. An irregularity alert is produced if an irregular event has occurred.

    Abstract translation: 检测不规则事件的系统和方法包括在多个通知中的每一个中提取测量值。 提取的值存储在度量数据库中,并且针对每个度量的值计算分布。 将提取的值与计算出的分布进行比较,以确定是否发生了不规则事件。 如果发生不规则事件,则产生不规则警报。

    LIVE STREAMING VIDEO OVER 3D
    276.
    发明申请
    LIVE STREAMING VIDEO OVER 3D 审中-公开
    现场流行3D视频

    公开(公告)号:US20140160251A1

    公开(公告)日:2014-06-12

    申请号:US14104147

    申请日:2013-12-12

    CPC classification number: H04N7/181 G06T19/006 H04N13/156 H04N13/275

    Abstract: A video monitoring system and method comprises a first camera at a first camera location configured to video record a first monitored area, wherein a georeference location of the first monitored area is known, and a virtual 3D model of the monitored zone that includes the first camera location and the first monitored area, wherein the virtual 3D model is georeferenced to a physical location. The system further comprises a processor configured to receive the video recording of the first monitored area and to overlay the video recording of the first monitored area onto a part of the virtual 3D model that corresponds to the georeference location of the first monitored area. A display is also connected to the processor and configured to display the virtual 3D model of the monitored zone overlaid with the video recording of the first monitored area.

    Abstract translation: 视频监控系统和方法包括:第一相机位置处的第一相机,被配置为视频记录第一监视区域,其中已知第一监视区域的地理参考位置,以及包括第一相机的所监视区域的虚拟3D模型 位置和第一监视区域,其中虚拟3D模型被地理参考到物理位置。 该系统还包括处理器,其被配置为接收第一监视区域的视频记录,并且将第一监视区域的视频记录覆盖到与第一监视区域的地理参考位置对应的虚拟3D模型的一部分上。 显示器还连接到处理器并且被配置为显示与第一监视区域的视频记录重叠的被监视区域的虚拟3D模型。

    SYSTEM AND METHOD FOR MALWARE DETECTION
    277.
    发明申请
    SYSTEM AND METHOD FOR MALWARE DETECTION 审中-公开
    用于恶意软件检测的系统和方法

    公开(公告)号:US20130347114A1

    公开(公告)日:2013-12-26

    申请号:US13874339

    申请日:2013-04-30

    CPC classification number: G06F21/56 G06F21/52 G06F21/566 H04L63/1425

    Abstract: Systems and methods for malware detection techniques, which detect malware by identifying the C&C communication between the malware and the remote host. In particular, the disclosed techniques distinguish between request-response transactions that carry C&C communication and request-response transactions of innocent traffic. Individual request-response transactions may be analyzed rather than entire flows, and fine-granularity features examined within the transactions. As such, these methods and systems are highly effective in distinguishing between malware C&C communication and innocent traffic, i.e., in detecting malware with high detection probability and few false alarms.

    Abstract translation: 用于恶意软件检测技术的系统和方法,通过识别恶意软件和远程主机之间的C&C通信来检测恶意软件。 特别地,所公开的技术区分携带C&C通信和无辜流量的请求 - 响应交易的请求 - 响应事务。 可以分析单独的请求 - 响应事务,而不是整个流程,以及在事务中检查的细粒度特征。 因此,这些方法和系统在区分恶意软件C&C通信和无害流量(即,以高检测概率和少量虚假警报)检测恶意软件方面是非常有效的。

    SYSTEM AND METHOD FOR INTERCEPTION OF IP TRAFFIC BASED ON IMAGE PROCESSING
    278.
    发明申请
    SYSTEM AND METHOD FOR INTERCEPTION OF IP TRAFFIC BASED ON IMAGE PROCESSING 有权
    用于拦截基于图像处理的IP交通的系统和方法

    公开(公告)号:US20130108114A1

    公开(公告)日:2013-05-02

    申请号:US13663388

    申请日:2012-10-29

    CPC classification number: H04L63/306 H04L63/164 H04L67/22 H04W4/21

    Abstract: Methods and systems for monitoring communication traffic in communication networks, such as Internet Protocol (IP) traffic transferred over the Internet or over a wireless network. The disclosed techniques identify communication traffic that is associated with target individuals, by extracting digital images from the traffic and recognizing target individuals who appear in the images. A correlation system monitors communication sessions that are conducted in a communication network to identify known target individuals who appear in images. Upon recognizing a target individual in an image extracted from a certain session, the system correlates this target user with one or more of the communication identifiers used in the session. The system automatically identifies IP addresses or other identifiers that are used by target individuals, and enable subsequent tracking of such identifiers.

    Abstract translation: 用于监测通信网络中的通信业务的方法和系统,例如通过因特网或无线网络传输的因特网协议(IP)业务。 所公开的技术通过从业务中提取数字图像并识别出现在图像中的目标个体来识别与目标个体相​​关联的通信业务。 相关系统监视在通信网络中进行的通信会话,以识别出现在图像中的已知目标个体。 在识别从某个会话提取的图像中的目标个体时,系统将该目标用户与在会话中使用的一个或多个通信标识符相关联。 系统自动识别目标个人使用的IP地址或其他标识符,并启用此类标识符的后续跟踪。

    Call summary
    279.
    发明授权

    公开(公告)号:US11841890B2

    公开(公告)日:2023-12-12

    申请号:US17188239

    申请日:2021-03-01

    CPC classification number: G06F16/345 G06Q10/10 G06Q30/016 G06N5/022

    Abstract: A faster and more streamlined system for providing summary and analysis of large amounts of communication data is described. System and methods are disclosed that employ an ontology to automatically summarize communication data and present the summary to the user in a form that does not require the user to listen to the communication data. In one embodiment, the summary is presented as written snippets, or short fragments, of relevant communication data that capture the meaning of the data relating to a search performed by the user. Such snippets may be based on theme and meaning unit identification.

Patent Agency Ranking