Video signature creation and matching
    4.
    发明授权
    Video signature creation and matching 有权
    视频签名创建和匹配

    公开(公告)号:US09578394B2

    公开(公告)日:2017-02-21

    申请号:US14667805

    申请日:2015-03-25

    摘要: In one embodiment, a system includes a processor to retrieve, from a memory, data of a video frame, the data including measurements of luminance, each of the measurements of luminance being associated with a different entry in a matrix, calculate a weighted average luminance value Ly for the measurements of luminance weighted according to a row position of the one measurement of luminance in the matrix, calculate a weighted average luminance value Lx for the measurements of luminance weighted according to a column position of the one measurement of luminance in the matrix, and create a video signature, S0, of the video frame, the video signature, S0, including the weighted average luminance value Ly and the weighted average luminance value Lx. Related apparatus and methods are also described.

    摘要翻译: 在一个实施例中,系统包括处理器,用于从存储器检索视频帧的数据,所述数据包括亮度测量值,每个亮度测量值与矩阵中的不同条目相关联,计算加权平均亮度 根据矩阵中的一次亮度测量的行位置对根据行位置进行加权的亮度的测量值Ly计算根据矩阵中的一次亮度测量的列位置加权的亮度的测量值的加权平均亮度值Lx ,并且创建视频帧的视频签名S0,包括加权平均亮度值Ly和加权平均亮度值Lx的视频签名S0。 还描述了相关装置和方法。

    Unjoining and rejoining clusters in computing networks

    公开(公告)号:US12113663B1

    公开(公告)日:2024-10-08

    申请号:US18446272

    申请日:2023-08-08

    摘要: A method for unjoining and rejoining clusters of computing nodes in edge site computing networks to reduce the impact of interruption to connectivity between computing nodes is presented. The method includes accessing a cluster of computing nodes executing on an edge site computing network. The cluster of computing nodes includes a plurality of follower computing nodes and a leader computing node. The method further includes detecting an interruption to connectivity established between the leader computing node and one or more of the plurality of follower computing nodes. In response to detecting the interruption to connectivity, the method includes bifurcating the cluster of computing nodes into a first subcluster of computing nodes and a second subcluster of computing nodes. In response to detecting a restoration of connectivity, the method includes recombining the first subcluster of computing nodes and the second subcluster of computing nodes.

    Symbiotic network orchestrator for computing networks

    公开(公告)号:US12003368B1

    公开(公告)日:2024-06-04

    申请号:US18446021

    申请日:2023-08-08

    IPC分类号: H04L41/0816 H04L41/0894

    CPC分类号: H04L41/0816 H04L41/0894

    摘要: A method for providing a symbiotic network orchestrator utilized to automatically commission edge computing devices on corporate computing networks and edge site computing networks is presented. The method includes receiving an indication of a potential connection of an edge computing device to one or more computing networks associated with the orchestrator. The one or more computing networks includes a corporate computing network and an edge site computing network. The method further includes determining, based on the corporate computing network, the edge site computing network, and a predetermined set of rules, an intent for commissioning the edge computing device, reconfiguring, based on the intent, the corporate computing network and the edge site computing network, and commissioning the edge computing device on one or more of the corporate computing network or the edge site computing network in accordance with the reconfiguring.

    PROTECTING PHYSICAL LOCATIONS WITH CONTINUOUS MULTI-FACTOR AUTHENTICATION SYSTEMS

    公开(公告)号:US20220394042A1

    公开(公告)日:2022-12-08

    申请号:US17340349

    申请日:2021-06-07

    发明人: Tal Maoz

    IPC分类号: H04L29/06

    摘要: This disclosure relates to methods, systems, and non-transitory computer-readable storage media for integrating a multi-factor authentication system with a security system. The present technology can receive authentication data descriptive of a user associated with a user device. The present technology can also permit the user to access a secure physical location. The present technology can also limit capabilities of the user device while the user is within the secure physical location.