摘要:
The present disclosure describes, among other things, a method that may include receiving, at one or more sensors in communication with a mobile computing device positioned within a device receptacle portion of a device, the device receptacle portion being configured to substantially enclose and protect the mobile computing device during physical activity, sensor data. The method may include determining, by a processor of the mobile computing device, motion data regarding a movement of the protective device. The method may include estimating a behavior of a user based in part upon the motion data. The method may include generating a response to the behavior including at least one of graphic, audio, tactile, or video output. The method may include providing, through a wireless communications path, the response to a second device in wireless communication with the mobile computing device.
摘要:
A system and method for return fraud prevention is provided, which includes a point of return terminal having an input means for accepting, identifying information presented by a person returning at least one article of merchandise and has at least one display unit for displaying digital photographic images of persons and textual information. The system further includes at least one remote database site having stored therein a database comprising a plurality of digital photographic images of persons to be identified. Linking the return terminal and the remote database site is a communications link, which allows data to be interchanged between the point of return terminal and the remote database site. The veracity of the system is ensured by including a means to verifying that the point of return terminal is authorized to access the remote database site, a means for verifying that an identifier present at the return terminal is also authorized to access the remote database site, and a means for verifying that the identifier present at the point of return terminal has compared the digital photographic images displayed on the return terminal display with the physical appearance of the person returning the merchandise and that a match exists between at least one of the displayed photographic images and the physical appearance of the person returning the merchandise.
摘要:
A device configured for the production of hydrokinetic energy that allows the efficient capture of energy from fluid in motion, especially slow flowing fluids. The device features an innovative structural design and drive train system as well as redundancy, which allows the device to be deployed in position, placed in service and maintained over its lifetime through the use of remotely operated vehicles. The device features one or more turbines, each turbine having an open center tube. The device features a buoyancy system including a plurality of thin walled modular buoyancy chambers with a redundant (re)pressurization system and remotely operated vehicle replaceable bladder modules. Structure cavities of the device are capable of storing energy via processed energy storage liquids such as hydrogen or via gas compression in tanks and then exporting the stored energy or reconverting the stored energy into electricity.
摘要:
In one aspect, the present invention relates to a web site which addresses the above difficulties and others by providing site where an author may upload creative works for sale at a price set by the author. The website allows users to purchase and rate the works, creating an environment where high-quality works may be identified by users. The website further systematizes the process by which works are acquired by an investment pool, which may be an investment pool run by the website operator. The investment pool will offer to buy the rights of any work achieving a given amount of sales or positive feedback on the site.
摘要:
A system and method of providing system integrity and audit capabilities to a positive identification system is disclosed. In the preferred embodiment, the system uses biometric access authority information units and a biometric comparison system at a remote database site to permit authorized system users to access the positive identification system. The system also utilizes secondary access authority information units to permit authorized system users to access the system in the event that one or more authorized system users cannot be authenticated using the biometric comparison system.
摘要:
In one aspect, the present invention relates to a web site which addresses the above difficulties and others by providing site where an author may upload creative works for sale at a price set by the author. The website allows users to purchase and rate the works, creating an environment where high-quality works may be identified by users. The website further systematizes the process by which works are acquired by an investment pool, which may be an investment pool run by the website operator. The investment pool will offer to buy the rights of any work achieving a given amount of sales or positive feedback on the site.
摘要:
A security identification system and method for identifying and/or verifying subjects includes analyzing primary biometric data of a subject and comparing it to known biometric data in a database. Primary biometric analysis includes determining whether a match exists with respect to the primary biometric data and, if a match exists, whether the match is a strong match. If the primary match is not a strong match, secondary biometric data is input for the subject. Secondary biometric analysis includes determining whether a match exists with respect to the secondary biometric data and whether the match is a strong match. An indication of whether the subject is cleared is provided based on the primary biometric data and, if collected, the secondary biometric analysis. In further aspects, expert analysis and automatic feedback may also be provided.
摘要:
The present invention is a system and method of providing system integrity and positive audit capabilities to a positive identification system. The use of access authority information units to gain access to the positive identification system solves the problems of open, unsecured and unauditable access to data for use in point of use identification systems. In order to secure the rights to the data that is needed to make mass identification systems operate, it must be shown that records will be closed and secure, as well as that there will be an audit trail of access that is made to the data. This system solves those problems through the use of a system and method for identification with biometric data and/or personal identification numbers and/or personalized devices embedded with codes unique to their assigned users.
摘要:
A system for harvesting, storing, and generating energy includes a subsurface structure supporting machinery to convert received energy into potential energy, store that potential energy, and at a later time convert that potential energy into electrical energy. The system includes one or more buoyant chambers that support the subsurface structure and are maintained with an internal that is approximately equal to the ambient pressure at their deployed depth. The system is anchored to the seafloor with one or more mo lines. Suspended from the subsurface structure are one or more weights that are hoisted up or lowered down by one or more winches The one or more winches comprise a spooling drum, and one or more motors and/or one or more generators or one or more motor/generators.
摘要:
The present disclosure describes, among other things, a method that may include receiving, at one or more sensors in communication with a mobile computing device positioned within a device receptacle portion of a device, the device receptacle portion being configured to substantially enclose and protect the mobile computing device during physical activity, sensor data. The method may include determining, by a processor of the mobile computing device, motion data regarding a movement of the protective device. The method may include estimating a behavior of a user based in part upon the motion data. The method may include generating a response to the behavior including at least one of graphic, audio, tactile, or video output. The method may include providing, through a wireless communications path, the response to a second device in wireless communication with the mobile computing device.