INTERIOR SENSOR CALIBRATION FOR AUTONOMOUS SYSTEMS AND APPLICATIONS

    公开(公告)号:US20250067581A1

    公开(公告)日:2025-02-27

    申请号:US18456070

    申请日:2023-08-25

    Abstract: In various examples, interior sensor calibration for autonomous systems and applications is described herein. Systems and methods are disclosed that may recalibrate sensors of a vehicle, such as sensors located within the interior of the vehicle, using one or more techniques. For instance, if a sensor is attached to a component within the interior of the vehicle, an additional sensor associated with the component may output data indicating the location and/or orientation of the component within the vehicle. The indicated location and/or orientation of the component may then be used to recalibrate the sensor with respect to a reference coordinate system of the vehicle. For a second example, the sensor may output data representing at least a feature located within the interior of the vehicle. The sensor may then again be recalibrated based at least on a portion of the data that represents the feature.

    LOW POWER PROXIMITY-BASED PRESENCE DETECTION USING OPTICAL FLOW

    公开(公告)号:US20240404296A1

    公开(公告)日:2024-12-05

    申请号:US18327643

    申请日:2023-06-01

    Abstract: In various examples, low power proximity based threat detection using optical flow for vehicle systems and applications are provided. Some embodiments may use a tiered framework that uses sensor fusion techniques to detect and track the movement of a threat candidate, and perform a threat classification and/or intent prediction as the threat candidate approaches approach. Relative depth indications from optical flow, computed using data from image sensors, can be used to initially segment and track a moving object over a sequence of image frames. Additional sensors and processing may be brought online when a moving object becomes close enough to be considered a higher risk threat candidate. A threat response system may generate a risk score based on a predicted intent of a threat candidate, and when the risk score exceeds a certain threshold, then the threat response system may respond accordingly based on the threat classification and/or risk score.

    NEURAL NETWORK BASED DETERMINATION OF GAZE DIRECTION USING SPATIAL MODELS

    公开(公告)号:US20210182609A1

    公开(公告)日:2021-06-17

    申请号:US17005914

    申请日:2020-08-28

    Abstract: Systems and methods for determining the gaze direction of a subject and projecting this gaze direction onto specific regions of an arbitrary three-dimensional geometry. In an exemplary embodiment, gaze direction may be determined by a regression-based machine learning model. The determined gaze direction is then projected onto a three-dimensional map or set of surfaces that may represent any desired object or system. Maps may represent any three-dimensional layout or geometry, whether actual or virtual. Gaze vectors can thus be used to determine the object of gaze within any environment. Systems can also readily and efficiently adapt for use in different environments by retrieving a different set of surfaces or regions for each environment.

    DETECTING IDENTITY SPOOFING ATTACKS IN MULTI-SENSOR SYSTEMS AND APPLICATIONS

    公开(公告)号:US20240022601A1

    公开(公告)日:2024-01-18

    申请号:US17863140

    申请日:2022-07-12

    Abstract: In various examples, techniques are described for detecting whether spoofing attacks are occurring using multiple sensors. Systems and methods are disclosed that include at least a first sensor having a first pose to capture a first perspective view of a user and a second sensor having a second pose to capture a second perspective view of the user. The first sensor and/or the second sensor may include an image sensor, a depth sensor, and/or the like. The systems and methods include a neural network that is configured to analyze first sensor data generated by the first sensor and second sensor data generated by the second sensor to determine whether a spoofing attack is occurring. The systems and methods may also perform one or more processes, such as facial recognition, based on whether the spoofing attack is occurring.

Patent Agency Ranking