Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

77 results about "Computer Point" patented technology

System for and Methods of Storing and Comparing Computer Generated Continuous Vector Lines through a Non-Secure or a Secure Communication Channel

The present invention includes a system for and methods of storing and comparing computer generated vector lines through an insecure or a secure communication channel. A continuous vector line (CVL) identifier includes from an ordered collection of 2 or more points. Using an input device (such as computer keyboard, finger, soft keypad, or any other input from body movements or input from electrical current or impulses, or input from human or mechanical sound waves) to a physical machine, or through a token (such as credit card, USB token, which can be carried around by user), a user enters and sends their unique identifier and reference code (such as a personal identification number (PIN), and/or password or other secret code) to the physical machine by making a contact or contact-less to the computer system. As part of the enrollment process the user inscribes a pre-determined set of continuous vector lines (CVLs). The CVLs include data points that are collected from any computer pointing device, such as a mouse, stylus or a digitizer tablet, in a specific format, using a push down anatomical technique and are sent to local active content (such as a library, or a program, or an add-on to the Internet browser such as ActiveX) or a remote server for further analysis of the two CVL's. A user should go through an Enrollment and Verification process to capture the data points and this process uses a two factor authentication and a verification scheme. The collected data points that represent a CVL profile made previously is kept in a database, registry, or memory that can be encrypted and accessed by using a reference number or other unique identifier. Access is either locally or remotely through any wired or wireless medium such as the Internet, Secure File Transfer Protocol (SFTP) server, cellular network or other communication connection to enable the comparison of a newly generated CVL identifier to the CVL profile generated previously.
Owner:JCLADS

Method for carrying out laser-micro-engraving marking anti-counterfeiting identification code on inner surface of transparent or translucent container

The invention discloses a method for carrying out laser-micro-engraving marking anti-counterfeiting identification code on the inner surface of a transparent or translucent container. In the method, laser-micro-engraving and a computer point cloud software system are utilized to carry out point cloud process on an anti-counterfeiting identification code; a computer marking software system controls a vibrating mirror and the10ns grade laser beam of a 532nm green laser to act on the surface of a transparent or translucent container according to a point cloud file so that the anti-counterfeiting identification code is marked on the inner surface of the transparent or translucent container, wherein the laser beam of the 532nm green laser has high pulse peak value power and high frequency of pulse laser beam. An anti-counterfeiting identification code is internally engraved on the surface of a glass winebottle, so the laser-micro-engraving marking anti-counterfeiting identification code is never worn. The invention has simple and compact structure, high laser-micro-engraving speed, is suitable for various transparent and colorful glass winebottles, and can be widely applied to laser-micro-engraving marking of winebottles in production lines of distilled spirit, red wine or beer industries.
Owner:WUHAN LEAD LASER

System and method for remote control coal mine evacuation working face advance detection and forecasting

ActiveCN101798923AAvoid harmComply with the requirements of the Safety RegulationsSurveyMining devicesControl systemRemote control
The invention discloses a system and method for remote control coal mine evacuation working face advance detection and forecasting, which comprises a remote control system, a firing device, a blasting excitation system, a blasting receiving system and an anti-explosion geological advance detector host, and is characterized in that the remote control system comprises an anti-explosion computer, a remote controller master computer and a remote control slave computer; the anti-explosion computer and the remote control master computer are connected to realize duplex communication; the remote controller master computer is connected with the remote controller slave computer point to point through a cable; the remote controller slave computer is connected with the anti-explosion geological advance detector master computer to realize duplex communication; the remote control coal mine evacuation working face advance detection and forecasting system also comprises a synchronous signal detectionbox; and the output end of the firing device is connected with the synchronous signal detection box, the firing device outputs excitation signals to the blasting excitation system through the synchronous signal detection box, thereby preventing an operator from harm.
Owner:CHINA COAL TECH & ENG GRP CHONGQING RES INST CO LTD

System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel

A system / method to store and compare computer generated vector lines through an insecure or a secure communication channel. Using an input device (i.e. computer Keyboard, finger, soft keypad, or any other input from body movements, electrical current, or impulses, or input from human or mechanical sound waves) to a physical machine, or through a token (i.e. credit card, USB token, which can be carried around by user), a user enters and sends their unique identifier and reference code (i.e. PIN, password, other secret code) to the physical machine by making a contact or contact-less to the computer system. As part of the enrollment process the user inscribes a pre-determined set of continuous vector lines (CVLs). The CVLs include data points that are collected from any computer pointing device in a specific format, using a push down anatomical technique and are sent to local active content (i.e. a library, or a program, or an add-on to the internet browser i.e. ActiveX) or a remote server for further analysis of the two CVLs. A user should go through an Enrollment and Verification process to capture the data points and this process uses a two factor authentication and a verification scheme. The collected data points that represent a CVL profile made previously is kept in a database, registry, or memory that can be encrypted and accessed (locally or remotely) by using a reference number or other unique identifier to enable the comparison of a newly generated CVL identifier to the previously generated one.
Owner:JCLADS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products