SCENE ANALYSIS FOR IMPROVED EYE TRACKING
    21.
    发明申请
    SCENE ANALYSIS FOR IMPROVED EYE TRACKING 有权
    改善眼睛跟踪的场景分析

    公开(公告)号:US20160048964A1

    公开(公告)日:2016-02-18

    申请号:US14458577

    申请日:2014-08-13

    Inventor: EZEKIEL KRUGLICK

    Abstract: Technologies related to scene analysis for improved eye tracking are generally described. In some examples, detected gaze targets may be derived from gaze direction information from an eye-facing sensor. Detected gaze target positions and/or motion may be improved by capturing and analyzing digital scene information from a scene visible by the eye. Digital scene information captured by a digital camera may be analyzed to identify potential gaze targets, such as stationary gaze targets, moving gaze targets, and/or accelerating gaze targets. Detected gaze targets may be modified to positions of selected gaze targets.

    Abstract translation: 通常描述与用于改善眼睛跟踪的场景分析相关的技术。 在一些示例中,检测到的注视目标可以从来自眼睛的传感器的注视方向信息导出。 可以通过从眼睛可见的场景中捕获和分析数字场景信息来改善检测目标位置和/或运动。 可以分析由数字照相机拍摄的数字场景信息,以识别潜在的凝视目标,例如固定凝视目标,移动目视目标和/或加速凝视目标。 检测到的目标靶可能被修改为所选注视目标的位置。

    QUORUM-BASED VIRTUAL MACHINE SECURITY
    22.
    发明申请
    QUORUM-BASED VIRTUAL MACHINE SECURITY 审中-公开
    基于QUORUM的虚拟机安全

    公开(公告)号:US20150381356A1

    公开(公告)日:2015-12-31

    申请号:US14827476

    申请日:2015-08-17

    Inventor: EZEKIEL KRUGLICK

    CPC classification number: H04L9/0825 G06F21/62 H04L63/062

    Abstract: Technologies related to quorum-based Virtual Machine (VM) security are generally described. In some examples, VM data, such as a VM payload or other VM data, may be quorum-encrypted, such that a quorum of decryption keys may be used to decrypt the data. Decryption keys may be distributed among multiple VMs, with different decryption keys provided to different VMs, so that single VMs may not decrypt the VM data without decryption keys held by other VMs. To decrypt its data, a VM may assemble a quorum of decryption keys by requesting decryption keys held by other operational VMs, and the VM may then decrypt its data using the assembled quorum of decryption keys. The VM may be prevented from decrypting its data without a sufficient quorum of other operational VMs.

    Abstract translation: 与基于法定虚拟机(VM)安全性相关的技术通常被描述。 在一些示例中,诸如VM有效载荷或其他VM数据的VM数据可以被加法加密,使得可以使用解密密钥的数量来解密数据。 解密密钥可以分布在多个虚拟机之间,其中不同的解密密钥被提供给不同的虚拟机,使得单个虚拟机不能解密虚拟机数据,而没有由其他虚拟机保存的解密密钥。 为了对其数据进行解密,VM可以通过请求由其他操作VM所保存的解密密钥来组合解密密钥的数量,然后VM可以使用组合的解密密钥解密其数据。 可以防止VM在没有足够的其他操作VM的数量的情况下解密其数据。

    DEVICE USAGE MESSAGE GENERATOR
    23.
    发明申请
    DEVICE USAGE MESSAGE GENERATOR 有权
    设备使用消息发生器

    公开(公告)号:US20150362969A1

    公开(公告)日:2015-12-17

    申请号:US14391640

    申请日:2014-03-18

    Inventor: EZEKIEL KRUGLICK

    Abstract: Technologies are generally described for systems, devices and methods effective to generate a message that may be sent to a social network. Power information from an electronic device may be detected by a power detector and received by a processor. For example, a power consumption profile of an appliance may be detected. The processor may classify the power information to produce descriptive data. For example, the processor may determine that an oven has been turned on for a period of time. The processor may generate the message by applying one or more rules to the descriptive data. For example, the processor may generate a message relating to consumption of dinner based on the determination that the oven has been turned on.

    Abstract translation: 通常描述了有效产生可发送到社交网络的消息的系统,设备和方法的技术。 来自电子设备的功率信息可由功率检测器检测并由处理器接收。 例如,可以检测器具的功耗曲线。 处理器可以对功率信息进行分类以产生描述性数据。 例如,处理器可以确定烤箱已经打开了一段时间。 处理器可以通过对描述性数据应用一个或多个规则来生成消息。 例如,处理器可以基于烤箱已被打开的确定产生与消费晚餐有关的消息。

    REPEATER EMULATION TO INCREASE NETWORK RANGE
    24.
    发明申请
    REPEATER EMULATION TO INCREASE NETWORK RANGE 审中-公开
    重复仿真以增加网络范围

    公开(公告)号:US20150333816A1

    公开(公告)日:2015-11-19

    申请号:US14812664

    申请日:2015-07-29

    Inventor: EZEKIEL KRUGLICK

    CPC classification number: H04B7/145 H04B7/15507 H04W56/00

    Abstract: Technologies are generally described for methods and systems configured to increase a range of a network. In an example, a method for increasing a range of a first network may include sending a request by a communication device to a network device while the communication device is in a range of the first network. The request may include a request for discovery data that identifies the first network. The method may further include receiving, by the communication device, the discovery data. The method may further include broadcasting, by the communication device, information based on the discovery data when the communication device is outside the range of the first network and when the communication device is configured to communicate over a second network. The second network may be different from the first network.

    Abstract translation: 一般来说,为配置成增加网络范围的方法和系统来描述技术。 在一个示例中,用于增加第一网络的范围的方法可以包括在通信设备处于第一网络的范围内时通过通信设备向网络设备发送请求。 该请求可以包括对识别第一网络的发现数据的请求。 该方法还可以包括由通信设备接收发现数据。 该方法还可以包括当通信设备在第一网络的范围之外时以及当通信设备被配置为通过第二网络通信时,由通信设备基于发现数据广播信息。 第二网络可能与第一网络不同。

    DATA CENTER WITH CONTINUOUS WORLD SWITCH SECURITY
    25.
    发明申请
    DATA CENTER WITH CONTINUOUS WORLD SWITCH SECURITY 有权
    具有连续世界开关安全的数据中心

    公开(公告)号:US20140304704A1

    公开(公告)日:2014-10-09

    申请号:US14301172

    申请日:2014-06-10

    Inventor: EZEKIEL KRUGLICK

    CPC classification number: G06F9/45533 G06F9/45558 G06F2009/45587 H04L67/10

    Abstract: Technologies related to continuous world switch security are generally described. In some examples, a world switch indicator may indicate whether continuous world switch security is on or off for a cloud customer. A hypervisor world switch security setting may be activated and deactivated, according to the world switch indicator, to optionally allow world switches and not context switches between virtual machines executed by a cloud server. Continuous world switch security may optionally be controlled by a cloud customer. Load balancing, cloud customer billing and other techniques are also disclosed to accommodate the activation/deactivation of continuous world switch security.

    Abstract translation: 通常描述与连续世界交换机安全性相关的技术。 在一些示例中,世界切换指示符可以指示云客户是否开启或关闭连续的世界交换机安全性。 根据世界交换机指示灯,可以激活和停用管理程序世界交换机安全设置,以可选地允许世界交换机,而不是由云服务器执行的虚拟机之间的上下文切换。 可持续的世界交换机安全性可以由云客户来控制。 还公开了负载平衡,云客户计费和其他技术,以适应连续世界交换机安全性的激活/停用。

Patent Agency Ranking