Clustering crowdsourced data to create and apply data input models
    1.
    发明授权
    Clustering crowdsourced data to create and apply data input models 有权
    聚类众包数据来创建和应用数据输入模型

    公开(公告)号:US08909565B2

    公开(公告)日:2014-12-09

    申请号:US13361941

    申请日:2012-01-30

    IPC分类号: G06N5/02 G06F15/18

    CPC分类号: G06F3/04886 G06F3/0237

    摘要: The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.

    摘要翻译: 提供了来自多个计算设备的数据输入特性的收集和聚类。 集群数据输入特性定义了用户被分配到的用户组。 基于分配给其的用户的数据输入特性,为每个用户组创建和分发诸如语言模型和触摸模型的输入模型。 例如,可以基于计算设备的当前上下文为计算设备选择输入模型。 所选择的输入模型在当前上下文中被应用于计算设备以改变经由计算设备从用户接收的输入的解释。

    CLUSTERING CROWDSOURCED DATA TO CREATE AND APPLY DATA INPUT MODELS
    2.
    发明申请
    CLUSTERING CROWDSOURCED DATA TO CREATE AND APPLY DATA INPUT MODELS 有权
    分组数据创建和应用数据输入模型

    公开(公告)号:US20130198115A1

    公开(公告)日:2013-08-01

    申请号:US13361941

    申请日:2012-01-30

    IPC分类号: G06F15/18 G06N5/02

    CPC分类号: G06F3/04886 G06F3/0237

    摘要: The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.

    摘要翻译: 提供了来自多个计算设备的数据输入特性的收集和聚类。 集群数据输入特性定义了用户被分配到的用户组。 基于分配给其的用户的数据输入特性,为每个用户组创建和分发诸如语言模型和触摸模型的输入模型。 例如,可以基于计算设备的当前上下文为计算设备选择输入模型。 所选择的输入模型在当前上下文中被应用于计算设备以改变经由计算设备从用户接收的输入的解释。

    TAMPER-TOLERANT PROGRAMS
    3.
    发明申请
    TAMPER-TOLERANT PROGRAMS 审中-公开
    防篡改计划

    公开(公告)号:US20100107245A1

    公开(公告)日:2010-04-29

    申请号:US12260581

    申请日:2008-10-29

    IPC分类号: G06F11/00

    CPC分类号: G06F21/52

    摘要: Tamper-tolerant programs enable correct and continued execution despite attacks. Programs can be transformed into tamper-tolerant versions that correct effects of tampering in response to detection thereof Tamper-tolerant programs can execute alone or in conjunction with tamper resistance/prevention mechanisms such as obfuscation and encryption/decryption, among other things. In fact, the same and/or similar mechanisms can be employed to protect tamper tolerance functionality.

    摘要翻译: 防篡改程序可以正确和持续执行,尽管发生攻击。 可以将程序转换成防篡改版本,以纠正篡改对于检测的影响。防篡改程序可以单独执行,也可以与诸如混淆和加密/解密之类的防篡改/预防机制一起执行。 事实上,可以采用相同和/或类似的机制来保护篡改容忍功能。

    Cover authoring systems and methods and bookbinding systems incorporating the same
    4.
    发明授权
    Cover authoring systems and methods and bookbinding systems incorporating the same 有权
    封面编写系统和方法以及包含其的装订系统

    公开(公告)号:US06910843B2

    公开(公告)日:2005-06-28

    申请号:US09991951

    申请日:2001-11-26

    IPC分类号: B42C19/02 B41J1/00 B41B1/00

    摘要: Cover authoring systems and methods for automatically composing a final content layout for a cover, including spinal content formatted to accommodate the width and height dimensions of the book spine, are described. By automatically computing the typeface parameter values based upon the selected visual fit model, this cover authoring scheme enables users to avoid the time consuming, laborious and expensive process of manually composing the final cover content layout with a conventional graphics program.

    摘要翻译: 描述了用于自动组合封面的最终内容布局的封面创作系统和方法,包括格式化以适应书脊的宽度和高度尺寸的脊柱内容。 通过基于选择的视觉拟合模型自动计算字体参数值,该封面创作方案使得用户能够避免使用传统图形程序手动组合最终封面内容布局的耗时,费力和昂贵的处理。

    Authenticatable graphical bar codes
    6.
    发明授权
    Authenticatable graphical bar codes 有权
    可验证的图形条形码

    公开(公告)号:US07107453B2

    公开(公告)日:2006-09-12

    申请号:US09728292

    申请日:2000-12-01

    摘要: Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information to be encoded, and a base image is modulated with a graphical encoding of the signed message to produce a marked image. In another aspect, a signed message is extracted from a marked image based upon a comparison of the marked image and a base image. The extracted signed message is decoded to produce a decoded message. Information encoded in the marked image is extracted from the decoded message and authenticated.

    摘要翻译: 描述用于生成和解码可鉴定图形条形码的系统和方法。 在一个方面,从要编码的信息生成确认签名的消息,并且用签名的消息的图形编码调制基本图像以产生标记的图像。 在另一方面,基于标记图像和基本图像的比较,从标记图像中提取签名消息。 提取的签名消息被解码以产生解码的消息。 从解码的消息中提取在标记图像中编码的信息并进行认证。

    Scalable, fraud resistant graphical payment indicia
    7.
    发明授权
    Scalable, fraud resistant graphical payment indicia 有权
    可扩展,防欺诈的图形支付标记

    公开(公告)号:US06938017B2

    公开(公告)日:2005-08-30

    申请号:US09728297

    申请日:2000-12-01

    摘要: Payment indicia generating schemes are described that enable users to customize the appearance of the payment indicium and to accommodate a wide variety of validation processing environments, while providing a substantial defense against fraudulent photocopy attack. In some embodiments, a corroborative digital token is generated from payment information, and a base image is modulated with a graphical encoding of the corroborative digital token to produce a payment indicium. In some embodiments, a payment indicium containing embedded payment information is rendered on a printing surface with a printing characteristic that degrades with photographic reproductions such that the embedded payment information is extractable from an original rendering of the payment indicium but is un-extractable from a photographic reproduction of an original rendering of the payment indicium. In some embodiments, payment information is encoded into a corroborative digital token based at least in part upon one or more variable encoding parameters, and a payment indicium containing the encoded payment information is rendered.

    摘要翻译: 描述支付标记生成方案,使得用户能够定制支付标记的外观并且适应各种各样的验证处理环境,同时提供对欺诈性复印攻击的实质防御。 在一些实施例中,从付款信息生成确认数字令牌,并且使用确认数字令牌的图形编码来调制基本图像以产生支付标记。 在一些实施例中,包含嵌入式支付信息的支付标记在打印表面上呈现,其印刷特性与照相复制品降级,使得嵌入的支付信息可从支付标记的原始呈现中提取,但不能从照相中提取 复制支付标记的原始呈现。 在一些实施例中,支付信息至少部分地基于一个或多个可变编码参数被编码为确认数字令牌,并且呈现包含编码支付信息的支付标记。

    Data location obfuscation
    8.
    发明授权
    Data location obfuscation 有权
    数据位置混淆

    公开(公告)号:US09117094B2

    公开(公告)日:2015-08-25

    申请号:US12260592

    申请日:2008-10-29

    IPC分类号: G06F12/14 G06F21/79

    CPC分类号: G06F21/79 G06F12/1408

    摘要: Programs running on an open architecture, such as a personal computer, are vulnerable to inspection and modification. This is a concern as the program may include or provide access to valuable information. As a defense, the actual location of data can be hidden throughout execution of the program by way of periodic location reordering and pointer scrambling, among other things. These techniques serve to complicate static data flow analysis and dynamic data tracking thereby at least deterring program tampering.

    摘要翻译: 在开放架构上运行的程序(如个人计算机)易受检查和修改。 这是一个问题,因为程序可能包含或提供有价值的信息。 作为防御,数据的实际位置可以通过周期性位置重排序和指针加扰等方式隐藏在程序的整个执行过程中。 这些技术有助于使静态数据流分析和动态数据跟踪复杂化,从而至少阻止程序篡改。

    DATA LOCATION OBFUSCATION
    9.
    发明申请
    DATA LOCATION OBFUSCATION 有权
    数据位置障碍

    公开(公告)号:US20100106920A1

    公开(公告)日:2010-04-29

    申请号:US12260592

    申请日:2008-10-29

    IPC分类号: G06F12/00

    CPC分类号: G06F21/79 G06F12/1408

    摘要: Programs running on an open architecture, such as a personal computer, are vulnerable to inspection and modification. This is a concern as the program may include or provide access to valuable information. As a defense, the actual location of data can be hidden throughout execution of the program by way of periodic location reordering and pointer scrambling, among other things. These techniques serve to complicate static data flow analysis and dynamic data tracking thereby at least deterring program tampering.

    摘要翻译: 在开放架构上运行的程序(如个人计算机)易受检查和修改。 这是一个问题,因为程序可能包含或提供有价值的信息。 作为防御,数据的实际位置可以通过周期性位置重排序和指针加扰等方式隐藏在程序的整个执行过程中。 这些技术有助于使静态数据流分析和动态数据跟踪复杂化,从而至少阻止程序篡改。