System interface design method
A technology of interface design and interface, applied in the direction of user interface execution, computing, computer components, etc., can solve problems such as missing and concealment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0088] Example 1: The original comparison reference of any face, gesture, and voice of the user comes from the user's self-set expressions and psychological subconscious behaviors, and the emotional perception cultivated by personality habits. The situation, the memories from previous times when you had these feelings, and many other factors. Determines emotion, not just a feeling, an expression. Emotional behavior is the superposition of a series of behavioral characteristics, or a combination of series of behavioral characteristics.
[0089] In reality, any expansion or contraction of the corner of the eye, or the rotation or closure of the eyeball up and down, the opening and closing of the lips, the relaxation or tension of the facial muscles, the clenching or releasing of any hands and fingers, Or any movement of finger gestures, any defined speech or reading fragments are the behavioral control and affirmation of the existence of man-made ego. Emotion is a general term...
example 2
[0097] Example 2: The application technology of a scene based on AR augmented reality technology.
[0098] A door is a physical management device for entering and exiting a space. Usually, when visiting, the user needs to open it for a third-party user (access authority or permission to enter).
[0099] Assume that before the entry door of a visitor (third-party user), the user is not inside the physical door. Third-party users identify each other through a system and the door. The identification technology includes any technical means such as NFC, Bluetooth, infrared, RFID, and IGRS to form data reading and connection with the door.
[0100] A visitor (third-party user) uses a system viewfinder camera, uses a part of the physical door as a technical background, and superimposes a visitor (third-party user) comparison reference object; for example, any time period defined by the user Emotions associated with faces, gestures, and voices can be pushed to users through any softw...
example 3
[0143] Example 3: The application technology of a scene based on VR augmented reality technology. This application technology can support password concealment and different technical fields such as transmission, games, and teaching.
[0144] Data concealment given a time limit for decryption, using a computer to generate a simulated environment is a system simulation of multi-source information fusion, interactive 3D dynamic vision and entity behavior that immerses users in the environment.
[0145] A system including the projection image of smart glasses is projected on the reflective screen of the optical reflection projection principle (HUD), and the user's emotional characteristics are captured by superimposing the convex lens refraction and the viewfinder camera, and the above-mentioned system interface is given to the user and the user interface The definition makes it a revelation of the interactive information of the man-machine system, and verifies the access authorit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com