G06F21/32

WATERCRAFT CONTROL METHOD, WATERCRAFT CONTROL PROGRAM, WATERCRAFT CONTROL SYSTEM, AND WATERCRAFT

A control method for a watercraft is used for the watercraft including a device that requires authentication of identification information for activation, and has reading processing, authentication processing, and activation permission processing. In the reading processing, the identification information is read by each of plural reading sections, each of which is mounted on a hull of the watercraft and can read the identification information. In the authentication processing, the identification information, which is read in the reading processing, is authenticated by referring to authentication information. In the activation permission processing, in the case where the identification information that is read by any one of the plural reading sections is successfully authenticated, the device is brought into an activatable state.

Anti-theft mobile terminal and method for controlling the extraction of a memory card out from a mobile terminal
11558748 · 2023-01-17 · ·

The disclosed technology relates to a mobile terminal adapted to receive a memory card comprising a processing unit, an input interface and a card locking actuator configured to lock the memory card into the mobile terminal. The card locking actuator is controlled by the processing unit. In one aspect, the card locking actuator is configured to be locked when the mobile terminal is switched on. In another aspect, the processing unit is configured to lock the screen until a screen unlocking authentication procedure is performed by a user at the input interface and is configured to command unlocking of the card locking actuator after detecting that a predetermined authentication procedure is performed by a user at the input interface.

Anti-theft mobile terminal and method for controlling the extraction of a memory card out from a mobile terminal
11558748 · 2023-01-17 · ·

The disclosed technology relates to a mobile terminal adapted to receive a memory card comprising a processing unit, an input interface and a card locking actuator configured to lock the memory card into the mobile terminal. The card locking actuator is controlled by the processing unit. In one aspect, the card locking actuator is configured to be locked when the mobile terminal is switched on. In another aspect, the processing unit is configured to lock the screen until a screen unlocking authentication procedure is performed by a user at the input interface and is configured to command unlocking of the card locking actuator after detecting that a predetermined authentication procedure is performed by a user at the input interface.

Authentication translation
11556617 · 2023-01-17 · ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

Authentication translation
11556617 · 2023-01-17 · ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

Artificial intelligence apparatus and method for controlling authority to use external device based on user identification using image recognition
11556623 · 2023-01-17 · ·

Disclosed herein an artificial intelligence (AI) apparatus for controlling authority to use an external device based on user identification using image recognition including a memory configured to store information on a user registered in the AI apparatus and authority information indicating whether a user is capable of use at least one external device under a predetermined condition, a communicator configured to receive a first image file obtained by photographing an environment including the at least one external device, a learning processor configured to provide the first image file to an image recognition model for specifying a face of a person included in an image file and an external device to be used by the person to specify first face information of a person included in the first image file and information on a first external device to be used by the person in the first image file, and a processor configured to control use of the first external device by the first user based on the authority, by acquiring a first user corresponding to the first face information and authority information of the first user.

Artificial intelligence apparatus and method for controlling authority to use external device based on user identification using image recognition
11556623 · 2023-01-17 · ·

Disclosed herein an artificial intelligence (AI) apparatus for controlling authority to use an external device based on user identification using image recognition including a memory configured to store information on a user registered in the AI apparatus and authority information indicating whether a user is capable of use at least one external device under a predetermined condition, a communicator configured to receive a first image file obtained by photographing an environment including the at least one external device, a learning processor configured to provide the first image file to an image recognition model for specifying a face of a person included in an image file and an external device to be used by the person to specify first face information of a person included in the first image file and information on a first external device to be used by the person in the first image file, and a processor configured to control use of the first external device by the first user based on the authority, by acquiring a first user corresponding to the first face information and authority information of the first user.

Employment recruitment method based on face recognition and terminal device using same

An employment recruitment method based on face recognition includes acquiring a candidate's data from a third-party website, analyzing the candidate's data by a semantic analysis method to identify human resources information of the candidate, and analyzing messages and postings in the human resources information of the candidate to determine candidate's personality. A terminal device acquires a second face image of the candidate by a second camera, analyzes the second face image of the candidate by a computer vision algorithm to determine a micro-expression of the candidate, and provides the candidate's human resources information, the candidate's personality, and the candidate's micro-expression to the recruiter to evaluate the candidate. The terminal device applying the method is also disclosed.

Employment recruitment method based on face recognition and terminal device using same

An employment recruitment method based on face recognition includes acquiring a candidate's data from a third-party website, analyzing the candidate's data by a semantic analysis method to identify human resources information of the candidate, and analyzing messages and postings in the human resources information of the candidate to determine candidate's personality. A terminal device acquires a second face image of the candidate by a second camera, analyzes the second face image of the candidate by a computer vision algorithm to determine a micro-expression of the candidate, and provides the candidate's human resources information, the candidate's personality, and the candidate's micro-expression to the recruiter to evaluate the candidate. The terminal device applying the method is also disclosed.

Digital assistant processing of stacked data structures
11557302 · 2023-01-17 · ·

Processing stacked data structures is provided. A system receives an input audio signal detected by a sensor of a local computing device, identifies an acoustic signature, and identifies an account corresponding to the signature. The system establishes a session and a profile stack data structure including a first profile layer having policies configured by a third-party device. The system pushes, to the profile stack data structure, a second profile layer retrieved from the account. The system parses the input audio signal to identify a request and a trigger keyword. The system generates, based on the trigger keyword and the second profile layer, a first action data structure compatible with the first profile layer. The system provides the first action data structure for execution. The system disassembles the profile stack data structure to remove the first profile layer or the second profile layer from the profile stack data structure.