-
公开(公告)号:US09286185B2
公开(公告)日:2016-03-15
申请号:US13995794
申请日:2012-11-16
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
Inventor: Shmuel Ur , Mordehai Margalit , Benjamin Maytal , Vlad Grigore Dabija , Noam Meir
IPC: G06F15/173 , G06F11/34
CPC classification number: G06F11/3466 , G06F11/3409 , G06F2201/865
Abstract: Technologies are generally described for systems, methods and devices configured to monitor a performance of a resource of a device. In some examples, a processor may receive an application code. The application code may include at least one application thread configured to implement at least one task for the application code. The application code may be configured to spawn a performance thread. The processor may execute the application thread on the computing device. The application thread may be configured to use at least one resource of the computing device. The processor may further execute the performance thread on the computing device. The performance thread may be configured to calculate a value relating to the resource.
Abstract translation: 通常描述了用于监视设备资源性能的系统,方法和设备的技术。 在一些示例中,处理器可以接收应用代码。 应用代码可以包括被配置为实现应用代码的至少一个任务的至少一个应用线程。 应用程序代码可以被配置为产生一个性能线程。 处理器可以在计算设备上执行应用程序线程。 应用程序线程可以被配置为使用计算设备的至少一个资源。 处理器可以进一步执行计算设备上的性能线程。 性能线程可以被配置为计算与资源相关的值。
-
公开(公告)号:US09280853B2
公开(公告)日:2016-03-08
申请号:US14716194
申请日:2015-05-19
Applicant: Empire Technology Development LLC
Inventor: Shmuel Ur
CPC classification number: G06T19/006 , A63F13/00 , A63F13/34 , A63F13/65 , A63F2300/8082 , H04L67/38 , H04N1/00 , H04N1/00347 , H04N7/147
Abstract: Technologies are generally described for systems, devices and methods effective to implement virtual and augmented reality. In an example, a first device may send data to a second device. The first device may include a processor and a memory. The processor may receive first image data based on a first real image from a third device. The first real image may include a fourth device image that relates to a fourth device. The processor may receive second image based on a second real image from the fourth device. The processor may send the first image data to the second device. The processor may receive a first request from the second device to receive the second image data. The processor may send a second request to the fourth device for the second image data, receive the second image data, and send the second image data to the second device.
Abstract translation: 技术通常描述为有效实现虚拟和增强现实的系统,设备和方法。 在一个示例中,第一设备可以向第二设备发送数据。 第一设备可以包括处理器和存储器。 处理器可以基于来自第三设备的第一实际图像接收第一图像数据。 第一实际图像可以包括与第四设备相关的第四设备图像。 处理器可以基于来自第四设备的第二实际图像接收第二图像。 处理器可以将第一图像数据发送到第二设备。 处理器可以从第二设备接收第一请求以接收第二图像数据。 处理器可以向第四设备发送用于第二图像数据的第二请求,接收第二图像数据,并将第二图像数据发送到第二设备。
-
公开(公告)号:US20150181632A1
公开(公告)日:2015-06-25
申请号:US14408135
申请日:2013-05-13
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Shmuel Ur , Vlad Grigore Dabija , David Ash
CPC classification number: H04W76/14 , G02B27/0093 , G02B27/017 , G02B2027/0178 , G06F3/012 , G06F3/013 , G06T19/006 , H04W4/80 , H04W12/08
Abstract: Technologies are generally described for systems, devices and methods effective to implement a line of sight initiated handshake. In some examples, a processor in a first communication device may detect a line of sight directed from the first communication device to a second communication device. The first communication device may send a handshake request to the second communication device. The first communication device may receive a handshake acknowledgement from the second communication device. The handshake request and handshake acknowledgement may be effective to create the handshake The first and second communication devices can thereafter share data.
Abstract translation: 技术通常描述为有效实现视线启动的握手的系统,设备和方法。 在一些示例中,第一通信设备中的处理器可以检测从第一通信设备指向第二通信设备的视线。 第一通信设备可以向第二通信设备发送握手请求。 第一通信设备可以从第二通信设备接收握手确认。 握手请求和握手确认可以有效地创建握手。第一和第二通信设备之后可以共享数据。
-
公开(公告)号:US20150161388A1
公开(公告)日:2015-06-11
申请号:US14370399
申请日:2013-07-18
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Mordehai Margalit , Shmuel Ur , David Hirshberg , Shimon Gruper
IPC: G06F21/55
CPC classification number: G06F21/554 , G06F12/1425 , G06F21/74 , G06F21/79
Abstract: Technologies are generally described for systems, devices and methods effective to detect a potential attack on a memory of a memory device. In some examples, a processor may send a request to the memory device. The request may include a request for information that relates to memory writes to the memory of the memory device. The processor may receive a response from the memory device. The response may include the information that relates to the memory writes. The processor may determine, based on the response, an amount of memory of the memory device written to during an interval of time. The processor may detect the potential attack based on the amount of memory written to and based on the interval of time. The processor may then generate an alert based on the detection of the potential attack.
Abstract translation: 通常描述了有效地检测对存储器件的存储器的潜在攻击的系统,设备和方法的技术。 在一些示例中,处理器可以向存储器件发送请求。 请求可以包括对与存储器设备的存储器的存储器写入相关的信息的请求。 处理器可以从存储器装置接收响应。 响应可以包括与存储器写入有关的信息。 处理器可以基于响应来确定在一段时间间隔期间写入的存储器件的存储器量。 处理器可以基于写入的存储器的量并基于时间间隔来检测潜在的攻击。 然后,处理器可以基于潜在攻击的检测来生成警报。
-
公开(公告)号:US20140330958A1
公开(公告)日:2014-11-06
申请号:US14008377
申请日:2013-05-06
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT, LLC
Inventor: Shmuel Ur , Mordehai Margalit , Benjamin Maytal , Vlad Grigore Dabija , Noam Meir
IPC: H04L12/26
CPC classification number: H04L43/0876 , G06F11/0709 , G06F11/076 , G06F11/3409 , G06F11/3495 , G06F2201/81 , G06F2201/88 , H04L41/06
Abstract: Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value.
Abstract translation: 通常描述有效监控计算设备性能的系统,设备和方法的技术。 计算设备可以接收指定的计数率。 计算设备可以以指定的计数速率进行计数以产生计数数字序列。 计算设备可以识别过程的第一输出,例如对数据执行的计算的结果,并且可以在识别出第一输出时识别第一计数号。 计算设备可以识别过程的第二输出,诸如来自计算的附加结果,并且可以在识别出第二输出时识别第二计数号。 然后,计算设备可以基于第一和第二计数号来确定是否应该生成警报,例如当第一和第二计数数字之间的差超过阈值时。
-
公开(公告)号:US20140218549A1
公开(公告)日:2014-08-07
申请号:US13978850
申请日:2013-02-01
Applicant: Empire Technology Development LLC
Inventor: Gad S. Sheaffer , Shmuel Ur , David Hirshberg , Yesha Sivan , Menahem Kaplan
CPC classification number: H04L67/025 , G06F3/005 , H04L51/046 , H04L65/602 , H04N5/23203 , H04N5/23296
Abstract: The disclosed technology receives at a second computing device a message from a first computing device comprising at least an indication of a physical motion, a requested motion, or an indication of a camera control operation. The indicated motion can correspond to a physical motion made to the first computing device. The indicated camera control operation can correspond to a camera control operation made at the first computing device. The technology requests to physically move the second computing device if the received message indicates a motion; and controls a digital camera associated with the second computing device if the received message indicates a camera control operation made at the first computing device.
Abstract translation: 所公开的技术在第二计算设备处接收来自第一计算设备的消息,该消息至少包括物理运动,所请求的运动或相机控制操作的指示的指示。 所指示的运动可以对应于对第一计算设备进行的物理运动。 所指示的相机控制操作可以对应于在第一计算设备处进行的相机控制操作。 如果接收到的消息指示运动,则技术要求物理地移动第二计算设备; 并且如果所接收的消息指示在第一计算设备处进行的相机控制操作,则控制与第二计算设备相关联的数字照相机。
-
公开(公告)号:US10229523B2
公开(公告)日:2019-03-12
申请号:US15477784
申请日:2017-04-03
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Gad S. Sheaffer , Shmuel Ur , Shay Bushinsky , Vlad Grigore Dabija
Abstract: Technologies are generally described for systems and methods effective to detect an alteration in augmented reality. A processor may receive a real image that corresponds to a real object and may receive augmented reality instructions to generate a virtual object. The processor may determine that the virtual object at least partially obscures the real object when the virtual object is rendered on a display. The processor may, upon determining that the virtual object at least partially obscures the real object when the virtual object is rendered on the display, simulate an activity on the real object to produce a first activity simulation and simulate the activity on the virtual object to produce a second activity simulation. The processor may determine a difference between the first and the second activity simulation and modify the augmented reality instructions to generate a modified virtual object in response to the determination of the difference.
-
公开(公告)号:US10192359B2
公开(公告)日:2019-01-29
申请号:US14384887
申请日:2014-01-31
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Shmuel Ur
Abstract: Technologies are generally described for systems, devices and methods effective to generate augmented image data. In some examples, a first device may receive first data from a second device. The first data may include data related to an image associated with the first device, such as an image of a user using the first device. The first device may apply an augmented reality skin to the first data to generate second data. The second data may relate to an augmented image associated with the first device. The first device may send the second data to the second device. The second device may then display the second data.
-
公开(公告)号:US10079743B2
公开(公告)日:2018-09-18
申请号:US14008377
申请日:2013-05-06
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Shmuel Ur , Mordehai Margalit , Benjamin Maytal , Vlad Grigore Dabija , Noam Meir
CPC classification number: H04L43/0876 , G06F11/0709 , G06F11/076 , G06F11/3409 , G06F11/3495 , G06F2201/81 , G06F2201/88 , H04L41/06
Abstract: Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value.
-
公开(公告)号:US10005427B2
公开(公告)日:2018-06-26
申请号:US15707436
申请日:2017-09-18
Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Inventor: Shmuel Ur , David Hirshberg , Shay Bushinsky , Vlad Grigore Dabija , Ariel Fligler
IPC: B60R25/10 , B60R25/102 , B60W50/04 , G06F21/55 , G06F21/57 , G08B21/18 , G01R31/28 , B60W50/02 , B60W50/00
CPC classification number: G06F17/5018 , B60R25/102 , B60W50/045 , B60W2050/0005 , B60W2050/0089 , B60W2050/0215 , G01R31/2829 , G06F21/554 , G06F21/577 , G06F2217/02 , G06F2217/32 , G08B21/182
Abstract: Methods and systems are provided that are effective to generate an alarm for a vehicle. The methods include receiving, by a device, a first sensor value from a first sensor for the vehicle. The methods further include receiving, by the device, a second sensor value from a second sensor for the vehicle. The methods further include retrieving, by the device, an instruction from a memory disposed in the vehicle while the memory is in a write-protected mode. The methods further include evaluating, by the device, the first sensor value and the second sensor value based on the instruction. The methods further include determining, by the device, that the first sensor value is outside a range associated with the first sensor based on the evaluation. The methods further include transforming, by the device, the determination into an alarm.
-
-
-
-
-
-
-
-
-