Patents by Inventor Nigel Lee
Nigel Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9532069Abstract: Systems and methods of improving video encoding/decoding efficiency may be provided. A feature-based processing stream is applied to video data having a series of video frames. Computer-vision-based feature and object detection algorithms identify regions of interest throughout the video datacube. The detected features and objects are modeled with a compact set of parameters, and similar feature/object instances are associated across frames. Associated features/objects are formed into tracks, and each track is given a representative, characteristic feature. Similar characteristic features are clustered and then stored in a model library, for reuse in the compression of other videos. A model-based compression framework makes use of the preserved model data by detecting features in a new video to be encoded, relating those features to specific blocks of data, and accessing similar model information from the model library.Type: GrantFiled: October 29, 2014Date of Patent: December 27, 2016Assignee: Euclid Discoveries, LLCInventors: Charles P. Pace, Darin DeForest, Nigel Lee, Renato Pizzorni, Richard Wingard
-
Publication number: 20160073111Abstract: Perceptual statistics may be used to compute importance maps that indicate which regions of a video frame are important to the human visual system. Importance maps may be applied to the video encoding process to enhance the quality of encoded bitstreams. The temporal contrast sensitivity function (TCSF) may be computed from the encoder's motion vectors. Motion vector quality metrics may be used to construct a true motion vector map (TMVM) that can be used to refine the TCSF. Spatial complexity maps (SCMs) can be calculated from metrics such as block variance, block luminance, SSIM, and edge strength, and the SCMs can be combined with the TCSF to obtain a unified importance map. Importance maps may be used to improve encoding by modifying the criterion for selecting optimum encoding solutions or by modifying the quantization for each target block to be encoded.Type: ApplicationFiled: September 3, 2015Publication date: March 10, 2016Inventors: Nigel Lee, Sangseok Park, Myo Tun, Dane P. Kottke, Jeyun Lee, Christopher Weed
-
Patent number: 9195830Abstract: A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module.Type: GrantFiled: March 29, 2011Date of Patent: November 24, 2015Assignee: BeCrypt LimitedInventors: James Ben Sidle, Bernard Parsons, Nigel Lee, Gordon Parrott
-
Publication number: 20150256850Abstract: Continuous block tracking (CBT) tracks macroblock locations over reference frames to produce better inter-predictions than conventional block-based motion estimation/compression. CBT includes frame-to-frame tracking, estimating motion from a frame to a previous frame, and continuous tracking, related frame-to-frame motion vectors to block tracks. Frame-to-frame tracking may include block based or hierarchical motion estimations. CBT combined with enhanced predictive zonal search may create unified motion estimation. Accumulated CBT results may form trajectories for trajectory-based CBT predictions. Metrics measuring continuous track and motion vectors quality can assess relative priority of CBT predictions against non-tracker-based predictions and to modify encoding choices. Continuous tracks can be analyzed for goodness-of-fit to translational motion models, with outliers removed from encoding. Translational motion models can be extended to entire frames in adaptive picture type selection.Type: ApplicationFiled: November 4, 2014Publication date: September 10, 2015Inventors: Dane P. Kottke, John J. Guo, Jeyun Lee, Sangseok Park, Christopher Weed, Justin Kwan, Nigel Lee
-
Publication number: 20150124874Abstract: Systems and methods of improving video encoding/decoding efficiency may be provided. A feature-based processing stream is applied to video data having a series of video frames. Computer-vision-based feature and object detection algorithms identify regions of interest throughout the video datacube. The detected features and objects are modeled with a compact set of parameters, and similar feature/object instances are associated across frames. Associated features/objects are formed into tracks, and each track is given a representative, characteristic feature. Similar characteristic features are clustered and then stored in a model library, for reuse in the compression of other videos. A model-based compression framework makes use of the preserved model data by detecting features in a new video to be encoded, relating those features to specific blocks of data, and accessing similar model information from the model library.Type: ApplicationFiled: October 29, 2014Publication date: May 7, 2015Inventors: Charles P. Pace, Darin DeForest, Nigel Lee, Renato Pizzorni, Richard Wingard
-
Patent number: 8902971Abstract: Systems and methods of improving video encoding/decoding efficiency may be provided. A feature-based processing stream is applied to video data having a series of video frames. Computer-vision-based feature and object detection algorithms identify regions of interest throughout the video datacube. The detected features and objects are modeled with a compact set of parameters, and similar feature/object instances are associated across frames. Associated features/objects are formed into tracks, and each track is given a representative, characteristic feature. Similar characteristic features are clustered and then stored in a model library, for reuse in the compression of other videos. A model-based compression framework makes use of the preserved model data by detecting features in a new video to be encoded, relating those features to specific blocks of data, and accessing similar model information from the model library.Type: GrantFiled: February 20, 2013Date of Patent: December 2, 2014Assignee: Euclid Discoveries, LLCInventors: Charles P. Pace, Darin DeForest, Nigel Lee, Renato Pizzorni, Richard Wingard
-
Publication number: 20140289537Abstract: An encryption system (10) and method for a computing device (100) having an encrypted operating system (50) is disclosed. The encryption system (10) includes a pre-operating system (20) and an encrypted start-up module (40). The pre-operating system (20) is executed on start-up of the computing device (100) and is configured to receive user inputs for authenticating the user, the pre-operating system (20) authenticating the user in dependence on the user inputs and, upon authentication, block-decrypting the encrypted start-up module into volatile memory (102) for booting of the encrypted operating system (50) on the computing device (100).Type: ApplicationFiled: March 20, 2013Publication date: September 25, 2014Applicant: BeCrypt LimitedInventors: Bernard Parsons, Nigel Lee, David Holloway
-
Publication number: 20130318597Abstract: A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a marker. User inputs are received on a password comprising a plurality of symbols and a location for each symbol in the user interface (20) relative to said positioning guide (100). Authentication is performed in dependence on the received user inputs and on the marker, the marker being selected from a plurality of markers, each marker designating a different condition to be met by the received user inputs to be successfully authenticated.Type: ApplicationFiled: May 24, 2013Publication date: November 28, 2013Applicant: BeCrypt LimitedInventors: Bernard Parsons, Nigel Lee, Ben Sidle
-
Publication number: 20130230099Abstract: A model-based compression codec applies higher-level modeling to produce better predictions than can be found through conventional block-based motion estimation and compensation. Computer-vision-based feature and object detection algorithms identify regions of interest throughout the video datacube. The detected features and objects are modeled with a compact set of parameters, and similar feature/object instances are associated across frames. Associated features/objects are formed into tracks and related to specific blocks of video data to be encoded. The tracking information is used to produce model-based predictions for those blocks of data, enabling more efficient navigation of the prediction search space than is typically achievable through conventional motion estimation methods. A hybrid framework enables modeling of data at multiple fidelities and selects the appropriate level of modeling for each portion of video data.Type: ApplicationFiled: March 12, 2013Publication date: September 5, 2013Applicant: Euclid Discoveries, LLCInventors: Darin DeForest, Charles P. Pace, Nigel Lee, Renato Pizzorni
-
Publication number: 20120303971Abstract: A dual environment computing system and method is disclosed. The dual computing system includes a first computing environment and a second computing environment. A data repository encodes, at any one time, at least one of the first and second computing environments in a hibernated state. The dual environment computing system is arranged, on demand, to operate one of the first and second computing environments in an active state, the dual environment computing system being further arranged, on demand, to transition the one of the first and second computing environments being operated in the active state into a hibernated state in the data repository and to transition the other of the first and second computing environments from the hibernated state into an active state.Type: ApplicationFiled: March 28, 2012Publication date: November 29, 2012Applicant: BeCrypt LimitedInventors: Andrew Palka, David Holloway, Nigel Lee, Bernard Parsons
-
Patent number: 8082434Abstract: A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.Type: GrantFiled: April 3, 2008Date of Patent: December 20, 2011Assignee: Becrypt LimitedInventors: Marc Hocking, Nigel Lee, Andrew Palka
-
Publication number: 20110246773Abstract: A secure access system, method and patch management system for access to a remote computer system is disclosed. The remote computer system requires local authentication to boot an operating system. A client module is arranged to be executed on the remote computer system upon booting of the computer system and is arranged upon execution to obtain access data over a network from an authentication system for access to the computer system and to use said access data to perform said local authentication at the remote computer system and boot said operating system. The authentication system being arranged to said store access data for the remote computer system in a data repository and being responsive to provide said access data to said client module over the network upon authentication of a request from the client module.Type: ApplicationFiled: March 29, 2011Publication date: October 6, 2011Applicant: BeCrypt LimitedInventors: James Ben Sidle, Bernard Parsons, Nigel Lee, Gordon Parrott
-
Publication number: 20090070576Abstract: A system and method for providing a secure computing environment to untrusted computer systems is described. A carrier media and an interface are provided, the interface being connectable to a computer to enable communication between the computer and the carrier media. The carrier media encodes a secure computing environment and a boot system, upon connection of the system via the interface to a computer system and booting of the computer system, the boot system is operative to take over the boot process of the computer system and to authenticate the user, wherein upon successful authentication, the boot system is arranged to load the secure computing environment on the computer system, the secure computing environment being configured to prevent predetermined interaction from outside the secure computing environment when it is running.Type: ApplicationFiled: April 3, 2008Publication date: March 12, 2009Applicant: BECRYPT LIMITEDInventors: Marc Hocking, Nigel Lee, Andrew Palka