会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • SYSTEM AND METHOD FOR ESTABLISHING VIRTUAL BOUNDARIES FOR ROBOTIC DEVICES
    • 用于建立机器人虚拟边界的系统和方法
    • US20160291596A1
    • 2016-10-06
    • US14850219
    • 2015-09-10
    • Bobsweep Inc.
    • Ali Ebrahimi Afrouzi
    • G05D1/02
    • G05D1/0234G05D2201/0215Y10S901/01
    • Methods for utilizing virtual boundaries with robotic devices are presented including: positioning a boundary component having a first receiver pair to receive a first robotic device signal substantially simultaneously by each receiver of the first receiver pair from a first robotic device only when the first robotic device is positioned along a first virtual boundary; operating the first robotic device to move automatically within an area co-located with the first virtual boundary; transmitting the first robotic device signal by the first robotic device; and receiving the first robotic device signal by the first receiver pair thereby indicating that the first robotic device is positioned along the first virtual boundary.
    • 提出了利用虚拟边界与机器人装置的方法,包括:仅当第一机器人装置是第一机器人装置时,定位具有第一接收器对的边界部件,以便从第一机器人装置基本上同时由第一接收器对的每个接收器同时接收第一机器人装置信号 沿着第一虚拟边界定位; 操作所述第一机器人装置在与所述第一虚拟边界共同定位的区域内自动移动; 通过第一机器人装置传输第一机器人装置信号; 以及由所述第一接收器对接收所述第一机器人装置信号,从而指示所述第一机器人装置沿着所述第一虚拟边界定位。
    • 10. 发明授权
    • Method for robotic devices to authenticate users
    • US10185815B1
    • 2019-01-22
    • US14820505
    • 2015-08-06
    • Bobsweep Inc.
    • Ali Ebrahimi AfrouziSoroush MehrniaAmin Ebrahimi AfrouziMasih Ebrahimi AfrouziAzadeh Afshar Bakooshli
    • G06K9/00G06F21/32
    • The present invention proposes a method for robotic devices to accurately identify authorized users. Biometric data of users is supplied to the system through biometric scanners. Biometric profiles of authorized users are identified to the system during an initial set-up phase. Subsequently, users provide biometric data to the system through the scanners in order to be authenticated. Received data is compared to the original stored profiles, and when a match is found, that user is authenticated. In another aspect of the invention, a time-activated memory storage process is utilized to prevent malicious attempts to overcome the authentication process. Memory cells become writable in successive time slots, after which point the memory cells are converted to read-only. If a user is authenticated during a particular time slot, their biometric data is written in the available memory cell. If no user is authenticated, the available memory cell is written with junk data. In this way, used memory cells may not be altered by a malicious attack. Furthermore, a loyalty metric is established for each user and stored in a loyalty index. The loyalty metric of each user is increased with each successful authentication. Functions of the robotic device may be assigned minimum loyalty requirements such that users must have had a number of successful past authentications in order to access some of the functions of the device.