Patent classifications
G06M1/27
Axial piston machine having integral counting perforation
An inclined-axis axial piston machine includes a housing, a drive shaft and a cylinder barrel. The drive shaft is mounted in the housing so as to be rotatable with respect to a first axis of rotation and is integral with a flange. Each piston is coupled to the flange via a ball joint. A multiplicity of counting perforations are arranged in a periodically distributed and continuous manner over an outer circumferential surface of the flange. The housing accommodates a sensor arranged opposite the counting perforations such that rotation of the drive shaft causes a signal change at the sensor. Each counting perforation is formed integrally from the flange, in the form of a recess having a single continuous perimeter. A side wall of the recess, starting from the perimeter, extends uninterruptedly, without sharp bends or offsets, over the entire circumference of the perimeter.
Method and device for detecting unauthorized tranfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Method and device for detecting unauthorized tranfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Method and device for detecting unauthorized transfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Method and device for detecting unauthorized transfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Digital prayer aid
A digital prayer aid is a handheld rosary bead counting tool having a loop of beads partially secured in a hand grip. The hand grip is configured to digitally count the advancement of a single bead. A digital display provides a user with a number of advanced beads. The hand grip and beads come in a plurality of configurations and colors. The hand grip may be Bluetooth® enabled to receive downloaded prayers and/or scriptural verses.
Digital prayer aid
A digital prayer aid is a handheld rosary bead counting tool having a loop of beads partially secured in a hand grip. The hand grip is configured to digitally count the advancement of a single bead. A digital display provides a user with a number of advanced beads. The hand grip and beads come in a plurality of configurations and colors. The hand grip may be Bluetooth® enabled to receive downloaded prayers and/or scriptural verses.
METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Pleat counter
A pleat counter and methods are provided to accurately count the number of pleats in a corrugated sheet of material to be used for the production of air filters. The pleat counter comprises a pleat detector mounted underneath a mounting board for counting the pleats. The mounting board is configured to position the pleat detector adjacent to the corrugated sheet of filter material. The pleat detector includes one or more sensors configured to detect the presence of individual pleats comprising the corrugated sheet. The pleat counter includes an interface configured to enable coupling the pleat counter with a data processing system. The data processing system may comprise any of a desktop, a tablet, a server, a mobile phone, a media player, a personal digital assistant (PDA), a personal communicator, a network router or hub, a wireless access point (AP) or repeater, a set-top box, or a combination thereof.