goo blog サービス終了のお知らせ 

和英特許翻訳メモ

便利そうな表現、疑問、謎、その他メモ書き。思いつきで書いてます。
拾った用例は必ずしも典型例、模範例ではありません。

実施例、実施形態;項目立て

2023-04-16 15:14:04 | 英語特許散策

ネイティブの英語明細書では「第1実施形態」、「第1の実施形態」(First Embodiment, Embodiment 1)のような項目名を立てることは日本語の場合にくらべ非常に少ない気がする(Example 1等は多い)。

US9464938(Boeing Co)
First Embodiment(*第1実施形態、第1の実施形態)

[0071] FIGS. 4A and 4B are top and side views of an idealized fixed-wing aircraft 20 having a single downward-facing camera 16 fixedly mounted thereto. A polarizing filter 18 is mounted in such a way that it has a fixed position relative to the camera and is disposed in front of the camera lens (not shown). The polarization angle is indicated by a two-headed arrow in FIG. 4A.

////////

Second Embodiment

[0074] In accordance with an alternative embodiment, a downward-pointing camera with a polarizing filter in a fixed position can be mounted on a rotorcraft. Because a rotorcraft is able to hover in one place, the rotorcraft pilot can position the rotorcraft at one position with the target in the camera's field of view and then hover at that position. While the rotorcraft is hovering, the pilot can cause the rotorcraft to yaw as three images are captured by the camera at different yaw angles, thereby orienting the polarizing filter in three directions while capturing the three images.

Third Embodiment

[0075] In accordance with another embodiment, an aircraft with a single camera pointed forward or aft uses bank angles to achieve different polarizing filter orientations. FIGS. 6A and 6B are side and front views of an idealized fixed-wing aircraft 20 having a single forward-pointing camera 16 fixedly mounted thereto. A polarizing filter 18 is mounted in such a way that it has a fixed position relative to the camera and is disposed in front of the camera lens (not shown). The polarization angle is again indicated by a two-headed arrow in FIG. 6B.

US9464938(AUTHENTEC INC [US])
A. First Embodiment

[0035] Referring now additionally to FIG. 2, further details of a first embodiment of a secure electronic device 100 , such as the computer 10 of FIG. 1, will be described. The computer 10 illustratively includes a host platform 102 having a processor 104 and other associated peripherals 106 such as memories, disk drives etc. as would be appreciated by those skilled in the art. For example, a suitable memory may have basic input/output system (BIOS) instructions stored therein, and/or a magnetic disk (e.g., a hard disk) may have operating system (OS) instructions stored therein. The operating system may be windows, for example, although the present invention may be used with other operating systems as well.

////////////

B. Second Embodiment

[0043] Referring now additionally to FIG. 3, further details of another embodiment of a secure electronic device 200 , such as the computer 10 of FIG. 1, will be described. The device 200 illustratively includes a host platform 202 having a processor 204 and other associated peripherals 206 .

US2011143769(MICROSOFT CORP [US])
Embodiment 1(*実施の形態1;滅多に見かけない)

[0092] A mobile phone ( 200 500 ), comprising: a first device ( 290 590 ) having a first display ( 210 510 ) and a first wireless modem ( 835 ); a second device ( 250 550 ) having a second display ( 260 560 ) and a second wireless modem ( 885 ), the second device ( 250 550 ) operable as a handset of the mobile phone ( 200 500 ); the first and second devices ( 290 590 250 550 ) being slidably attachable to each other and releasable from each other so that in a closed configuration, the first and second devices ( 290 590 250 550 ) are attached and the second display ( 260 560 ) is hidden beneath the first device ( 290 590 ); in an open configuration, the first and second devices ( 290 590 250 550 ) are attached and the first and second displays ( 210 510 260 560 ) are both visible and function as a single integrated display; and in a detached configuration, the first and second devices ( 290 590 250 550 ) are detached from one another for wireless communication there between.

Embodiment 2

[0093] The mobile phone ( 200 500 ) of any of the previous numbered embodiments, wherein the second device ( 250 550 ) can slide both horizontally and vertically with respect to the first device ( 290 590 ) to allow the first and second displays ( 210 510 260 560 ) be substantially flush with each other in the open configuration.

US2019309176(TESLA NANOCOTINGS INC [US])
EXAMPLE 1.(*実施例1)

[0070] Two moles ethylene glycol and one mole of tetramethyl silicate were heated first under reflux at 60° C., and then in a distillation apparatus until no methanol was recovered. Two moles of 1,4-phenylene di-isocyanate was added. 100 ml of the mixture was added slowly onto 50 g of amino-CNTs under vacuum. The mixture was filtered using suction. Half of the amino groups in 16-aminodendrimer were reacted with butanoyl anhydride. The product was dissolved into butyl propionate, and dry ice cooled (about −50° C.). Filled CNTs were added slowly mixing very well. The mixture was filtered with suction and the product was mixed immediately with the diglycidyl ether of bisphenol A.

US9697371(GOOGLE INC [US])
Example 1

[0095] A method comprising: receiving, by a TEE implemented by a computing device, an operation request requiring use of protected data accessible only to the TEE; responsive to receiving the operation request, generating, by the TEE, first data; sending, by the computing device, the first data to a remote computing device; responsive to sending the first data, receiving, by the TEE, second data only if a constraint on usage of the protected data is satisfied; validating, by the TEE, the second data to verify the remote computing device generated the second data; and responsive to validating the second data was generated by the remote computing device, performing an operation indicated by the operation request using the protected data.

Example 2

[0096] The method of example 1, wherein validating the second data comprises: using, by the TEE, a cryptographic key to decrypt the second data, wherein the second data comprises a first hash value of the first data generated by the remote computing device; performing, by the TEE, a hashing algorithm on the first data to generate a second hash value of the first data; and determining, by the TEE, the second data is verified when the first hash value matches the second hash value.

コメント    この記事についてブログを書く
  • X
  • Facebookでシェアする
  • はてなブックマークに追加する
  • LINEでシェアする
« MCG, SCG, マスタセル | トップ | 化粧室 »
最新の画像もっと見る

コメントを投稿

英語特許散策」カテゴリの最新記事