Patents by Inventor Chi Hung Tong
Chi Hung Tong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11838490Abstract: A system and a method of calibrating a plurality of digital imaging sensors with different modality for image fusion, comprising the steps of calibrating each digital image generated by a corresponding digital imaging sensor with one or more intrinsic parameters; scaling each digital image at a scaling ratio to generate a scaled digital image which has an overlapping region of interest; cross referencing one or more scaled digital images to derive one or more extrinsic parameters; calibrating each digital imaging sensor with the extrinsic parameters; and transforming and rectifying each digital image such that the region of interest of each digital image is coplanar and aligned.Type: GrantFiled: June 29, 2018Date of Patent: December 5, 2023Assignee: Logistics and Supply Chain MultiTech R&D Centre LimitedInventors: Hung Kwan Chen, Chi Hung Tong
-
Patent number: 11836984Abstract: A system and a method for an electronic device for counting objects of similar type in an area includes a register for storing a number of count of the objects in the area; a depth sensor for measuring depth distances between a plurality of points of an object and the depth sensor; a thermal sensor for measuring temperatures of the points of the object; wherein the distances and the temperatures are used to derive spatial thermal information of the object for determining an increase in the number stored in the register.Type: GrantFiled: June 29, 2018Date of Patent: December 5, 2023Assignee: Logistics and Supply Chain MultiTech R&D Centre LimitedInventors: Hung Kwan Chen, Chi Hung Tong
-
Publication number: 20230315824Abstract: A computer-implemented method for managing operation of an application includes: authenticating a user of the application or a user device associated with a user of the application; and establishing a session with the application and enabling access to the application for the user if the user or the user device is authenticated. The method further includes determining, after the user or the user device is authenticated, whether the user or the user device is or remains present. The method further includes maintaining the session and the enabling of access to the application if it is determined that the user or the user device is or remains present; and terminating the session and disabling access to the application if it is determined that the user or the user device is absent for a predetermined duration.Type: ApplicationFiled: March 31, 2022Publication date: October 5, 2023Inventors: Kwong Yeung Simon Wong, Chi Hung Tong, Chin Chiu Chung, Sze Man Tong, Chun On Wong
-
Publication number: 20230316004Abstract: A computer-implemented method for training a natural language translation model. The computer-implemented method includes: processing one or more sets of electronic parallel documents to obtain a plurality of aligned parallel sentences; creating a first training set including a subset of the plurality of aligned parallel sentences; and training the natural language translation model in a first stage using the first training set. The computer-implemented method further includes: modifying the first training set based on translation errors detected after the first stage of training; creating a second training set based on the modified first training set and at least some of the plurality of aligned parallel sentences not in the first training set; and training the natural language translation model in a second stage using the second training set so as to improve translation performance of the natural language translation model.Type: ApplicationFiled: March 31, 2022Publication date: October 5, 2023Inventors: Kwong Yeung Simon Wong, Chun On Wong, Chin Chiu Chung, Sze Man Tong, Chi Hung Tong
-
Publication number: 20230286702Abstract: An anti-tampering container comprising a container arranged to contain an object; an enclosure arranged to lock and seal the container in an enclosed state so as to prevent an access of the object contained in the container; and a detection module including an anti-tampering arrangement arranged to detect tampering of the enclosed state of the container, and to provide a notification of the tampering being detected.Type: ApplicationFiled: August 14, 2020Publication date: September 14, 2023Inventors: Chi Hung Tong, Tik Sze Wai, Ka Lun Fan, Yeung Simon Wong Kwong
-
Patent number: 11250374Abstract: A locker for receiving and retaining one or more packages includes an enclosure, the enclosure defining a storage cavity, the storage cavity configured to receive and retain the one or more goods, a radio signal sensing assembly disposed on the enclosure for sensing radio signals, the radio signal sensing assembly disposed on the enclosure in an orientation such that the radio signal sensing assembly can detect the presence of radio signals within the storage cavity.Type: GrantFiled: March 18, 2016Date of Patent: February 15, 2022Assignee: Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies LimitedInventors: Chi Lun Mak, Chi Wai Leung, Chi Hung Tong
-
Patent number: 11170595Abstract: An access control system comprising a first detector, a second detector, and a processor. The first detector is operable to detect presence of a subject in proximity of the access control system. The second detector operable to detect an object identifier associated with an object carried by the subject in proximity of the access control system. The processor is operably connected with the first detector and the second detector. The processor is operable to receive, from the first detector, a first signal indicative of the detection of the presence of the subject, and receive, from the second detector, a second signal containing the detected object identifier. During operation, the processor is arranged to determine that an access event has occurred when it receives both the first signal and the second signal.Type: GrantFiled: March 15, 2017Date of Patent: November 9, 2021Assignee: Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies LimitedInventors: Jing Tian Xi, Chin Chiu Chung, Chi Hung Tong, Kwong Yeung Simon Wong
-
Publication number: 20210274150Abstract: A system and a method of calibrating a plurality of digital imaging sensors with different modality for image fusion, comprising the steps of calibrating each digital image generated by a corresponding digital imaging sensor with one or more intrinsic parameters; scaling each digital image at a scaling ratio to generate a scaled digital image which has an overlapping region of interest; cross referencing one or more scaled digital images to derive one or more extrinsic parameters; calibrating each digital imaging sensor with the extrinsic parameters; and transforming and rectifying each digital image such that the region of interest of each digital image is coplanar and aligned.Type: ApplicationFiled: June 29, 2018Publication date: September 2, 2021Inventors: Hung Kwan Chen, Chi Hung Tong
-
Publication number: 20210271895Abstract: A system and a method for an electronic device for counting objects of similar type in an area includes a register for storing a number of count of the objects in the area; a depth sensor for measuring depth distances between a plurality of points of an object and the depth sensor; a thermal sensor for measuring temperatures of the points of the object; wherein the distances and the temperatures are used to derive spatial thermal information of the object for determining an increase in the number stored in the register.Type: ApplicationFiled: June 29, 2018Publication date: September 2, 2021Inventors: Hung Kwan Chen, Chi Hung Tong
-
Publication number: 20210271922Abstract: A system and a method for a crowd surveillance device comprising a multi-sensor system connected to a processing device, wherein the processing device comprises an image fusion module for receiving images from the multi-sensor system, transforming and fusing images into a fused image; an image analytic module for extracting each individual target and identifying any conceal object on the individual target, an alert triggering module for triggering an alert in the event a conceal object on the individual target is identified.Type: ApplicationFiled: June 29, 2018Publication date: September 2, 2021Inventors: Hung Kwan Chen, Chi Hung Tong
-
Patent number: 10902611Abstract: A system for detecting inactive objects includes a thermal imaging device arranged to acquire a thermal signature of an active object; movement detection processor arranged to process the thermal signature of the active object to monitor for any motion of the active object and whenupon the thermal signature indicates that the motion of the active object is below a movement threshold, determine that the active object is inactive.Type: GrantFiled: December 28, 2018Date of Patent: January 26, 2021Assignee: Logistics and Supply Chain MultiTech R&D Centre LimitedInventors: Hung Kwan Chen, Chi Hung Tong, Ka Man Ng, King Hong Paros Kwan
-
Publication number: 20200293990Abstract: A locker for receiving and retaining one or more packages comprising: an enclosure, the enclosure defining a storage cavity, the storage cavity configured to receive and retain the one or more goods, a radio signal sensing assembly disposed on the enclosure for sensing radio signals, the radio signal sensing assembly disposed on the enclosure in an orientation such that the radio signal sensing assembly can detect the presence of radio signals within the storage cavity.Type: ApplicationFiled: March 18, 2016Publication date: September 17, 2020Inventors: Chi Lun Mak, Chi Wai Leung, Chi Hung Tong
-
Publication number: 20200284066Abstract: A system and method for controlling a locking device used in logistic management, the method including the step of receiving a command associated with an operation of a mechanical locking device; validating the received command and a protocol associated with the command; and manipulating the mechanical locking device operable in at least a locking state and an unlocking state; wherein the mechanical locking device is arranged to operate in response to a successful validation of the command associated with one of at least two protocols.Type: ApplicationFiled: March 7, 2019Publication date: September 10, 2020Inventors: Chi Hung Tong, Hung Kwan Chen, Wai Tong Luk
-
Publication number: 20200134836Abstract: A system for detecting inactive objects includes a thermal imaging device arranged to acquire a thermal signature of an active object; movement detection processor arranged to process the thermal signature of the active object to monitor for any motion of the active object and whenupon the thermal signature indicates that the motion of the active object is below a movement threshold, determine that the active object is inactive.Type: ApplicationFiled: December 28, 2018Publication date: April 30, 2020Inventors: Hung Kwan Chen, Chi Hung Tong, Ka Man Ng, King Hong Paros Kwan
-
Publication number: 20200005574Abstract: An access control system comprising a first detector, a second detector, and a processor. The first detector is operable to detect presence of a subject in proximity of the access control system. The second detector operable to detect an object identifier associated with an object carried by the subject in proximity of the access control system. The processor is operably connected with the first detector and the second detector. The processor is operable to receive, from the first detector, a first signal indicative of the detection of the presence of the subject, and receive, from the second detector, a second signal containing the detected object identifier. During operation, the processor is arranged to determine that an access event has occurred when it receives both the first signal and the second signal.Type: ApplicationFiled: March 15, 2017Publication date: January 2, 2020Inventors: Jing Tian Xi, Chin Chiu Chung, Chi Hung Tong, Kwong Yeung Simon Wong
-
Patent number: 9666053Abstract: A device for tagging an object includes a tag body having an engagement arrangement with a removable strap for engaging the tag body to the object. The engagement arrangement further includes a sensing arrangement having a strap sensor arrv banged to be connected to the removable strap to detect a disengagement of the tag body from the object. The removable strap further includes a conductive member arranged to connect with the strap sensor and disconnect from the strap sensor when the tag body is disengaged from the object.Type: GrantFiled: February 8, 2013Date of Patent: May 30, 2017Assignee: Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies LimitedInventors: Kwong Yeung Simon Wong, Chi Hung Tong, Chun Wai Lai, Tsz Ching Anthony Kwok, Yiu Man Chan
-
Publication number: 20150379850Abstract: Herein is provided a device for tagging an object comprising a tag body having an engagement arrangement for engaging the tag body to the object, wherein the engagement arrangement includes at least one sensing arrangement arranged to detect a disengagement of the tag body from the object.Type: ApplicationFiled: February 8, 2013Publication date: December 31, 2015Inventors: Kwong Yeung Simon Wong, Chi Hung Tong, Chun Wai Lai, Tsz Ching Anthony Kwok, Yiu Man Chan
-
Publication number: 20140108286Abstract: Subcontracting is a common practice in logistics industry for delivering goods from a consigner to a consignee, meaning that a prime logistics service provider, e.g. a third-party logistics company, usually outsources its contracted logistics service from the consigner to specialized companies to execute individual logistics operations. In the present disclosure, a light-weight privacy protection mechanism is introduced for these enterprises with subcontracting relationships to share logistics track and trace data captured with Auto-ID systems equipped with RFID readers, sensors, or global positioning devices. The mechanism consists of a set of protocols designed for the involved stakeholders to register and cancel subcontracting relationship, to set up and clear outsourced logistics job, to upload, update and clear the job data, to track the job execution progress and trace the job execution history, and a method and system to implement these protocols.Type: ApplicationFiled: December 18, 2013Publication date: April 17, 2014Applicant: Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling TechnologiesInventor: Chi Hung Tong
-
Publication number: 20120232945Abstract: Subcontracting is a common practice in logistics industry for delivering goods from a consigner to a consignee, meaning that a prime logistics service provider, e.g. a third-party logistics company, usually outsources its contracted logistics service from the consigner to specialized companies to execute individual logistics operations. In the present disclosure, a light-weight privacy protection mechanism is introduced for these enterprises with subcontracting relationships to share logistics track and trace data captured with Auto-ID systems equipped with RFID readers, sensors, or global positioning devices. The mechanism consists of a set of protocols designed for the involved stakeholders to register and cancel subcontracting relationship, to set up and clear outsourced logistics job, to upload, update and clear the job data, to track the job execution progress and trace the job execution history, and a method and system to implement these protocols.Type: ApplicationFiled: March 10, 2012Publication date: September 13, 2012Applicant: Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling TechnologiesInventor: Chi Hung Tong
-
Publication number: 20030161472Abstract: A server-assisted computational method for computing the RSA cryptography is delineated in this document. The method enables public-key functions on the resource-constrained devices, such as a mobile phone or a PDA, by leveraging the rich computing resources provided by the server-grade computers on the network. Public-key processing, which is computationally intensive as commonly known, if loaded solely on the constrained device, would easily overwhelm the processor capacity and electrical power supply. The server-assisted method enables such device to drive a powerful server computer on the Internet to carry out the public-key number-crunching job for its sake. Some near-completion results are communicated back to the device. From that, the final public-key cryptograph is derived. Privacy and security are the utmost important considerations in public-key systems. The present invention ensures the privacy of the device by blinding the server of the secret message and the crypto keys of the device.Type: ApplicationFiled: February 27, 2002Publication date: August 28, 2003Inventors: Chi Hung Tong, Chi Kwong Hui, Ada Wai Chee Fu, Francis Chi Moon Lau