摘要:
For user authentication, finger touch information from a user is accepted via a touch sensitive element, the finger touch information including at least a time series of finger touch samples that define a trace of the user's signature, and each of the finger touch samples including centroid coordinates and non-centroid information, the non-centroid information including at least one of (A) a shape of the finger touch sample, (B) a size of the finger touch sample, (C) an orientation of the finger touch sample, and (D) characteristics of a multi-touch finger touch sample. A similarity of such finger touch samples with previously entered and stored finger touch samples is determined and compared with a threshold for purposes of user authentication.
摘要:
For user authentication, finger touch information from a user is accepted via a touch sensitive element, the finger touch information including at least a time series of finger touch samples that define a trace of the user's signature, and each of the finger touch samples including centroid coordinates and non-centroid information, the non-centroid information including at least one of (A) a shape of the finger touch sample, (B) a size of the finger touch sample, (C) an orientation of the finger touch sample, and (D) characteristics of a multi-touch finger touch sample. A similarity of such finger touch samples with previously entered and stored finger touch samples is determined and compared with a threshold for purposes of user authentication.
摘要:
Automatic application logging, in one aspect, may receive a directive for logging data associated with an application. One or more runtime objects of an instance of the application running on a processor may be modified according to the directive to collect the data. The data may be collected via the modified one or more runtime objects.
摘要:
A method of disseminating a message is disclosed. The message is encoding in a barcode. A selected region of the barcode is damaged so as to hinder decoding of the message at a scanning device. The damaged region of the barcode may be occluded from the scanning device in order to enable the scanning device to read the barcode and the message therein.
摘要:
A method, system and machine-readable medium are provided for watermarking natural language digital text. A deep structure may be generated and a group of features may be extracted from natural language digital text input. The deep structure may be modified based, at least partly, on a watermark. Natural language digital text output may be generated based on the modified deep structure.
摘要:
A method of disseminating a message is disclosed. The message is encoding in a barcode. A selected region of the barcode is damaged so as to hinder decoding of the message at a scanning device. The damaged region of the barcode may be occluded from the scanning device in order to enable the scanning device to read the barcode and the message therein.
摘要:
A method of disseminating a message is disclosed. The message is encoding in a barcode. A selected region of the barcode is damaged so as to hinder decoding of the message at a scanning device. The damaged region of the barcode may be occluded from the scanning device in order to enable the scanning device to read the barcode and the message therein.
摘要:
A method of disseminating a message is disclosed. The message is encoding in a barcode. A selected region of the barcode is damaged so as to hinder decoding of the message at a scanning device. The damaged region of the barcode may be occluded from the scanning device in order to enable the scanning device to read the barcode and the message therein.
摘要:
A method, system and machine-readable medium are provided for watermarking natural language digital text. A deep structure may be generated and a group of features may be extracted from natural language digital text input. The deep structure may be modified based, at least partly, on a watermark. Natural language digital text output may be generated based on the modified deep structure.
摘要:
Automatic application logging, in one aspect, may receive a directive for logging data associated with an application. One or more runtime objects of an instance of the application running on a processor may be modified according to the directive to collect the data. The data may be collected via the modified one or more runtime objects.