Patent classifications
G06K7/1439
SYSTEMS AND METHODS FOR BARCODE ANNOTATIONS FOR DIGITAL IMAGES
A content-based image retrieval (CBIR) system and method is presented herein. The CBIR system generates a relatively short vector or array of data, referred to as a barcode, from an input image. The short vector or array data can be used to represent the content of the image for image retrieval purposes. The system obtains the image and applies a transform to the image to generate a plurality of image transform values. The system thresholds the plurality of image transform values to obtain compact image transform values. The system generates a barcode in accordance with the compact image transform values and representative of the image. The system may then transmit the barcode to a database for storage or draw the barcode on a display. The system may also compare barcodes to find and retrieve similar images associated with similar barcodes.
CODE GENERATION METHOD
According to one embodiment, there is provided a code generation method including acquiring, and generating a code. In the acquiring, class information correlated with each of code rankings based on a plurality of different cell configurations is acquired. In the generating, a plurality of codes including the acquired class information are generated based on the cell configurations according to the code rankings. Each of the plurality of codes includes information indicating the presence or absence of a code of a next related ranking.
COLOCATED SHARED AUGMENTED REALITY WITHOUT SHARED BACKEND
Methods and systems are disclosed for creating a shared augmented reality (AR) session. The methods and systems perform operations comprising: receiving, by a client device, input that selects a shared augmented reality (AR) experience from a plurality of shared AR experiences; in response to receiving the input, determining one or more resources associated with the selected shared AR experience; determining, by the client device, that two or more users are located within a threshold proximity of the client device; and activating the selected shared AR experience in response to determining that the two or more users are located within the threshold proximity of the client device.
COLOCATED SHARED AUGMENTED REALITY WITHOUT SHARED BACKEND
Methods and systems are disclosed for creating a shared augmented reality (AR) session. The methods and systems perform operations comprising: receiving, by a client device, input that selects a shared augmented reality (AR) experience from a plurality of shared AR experiences; in response to receiving the input, determining one or more resources associated with the selected shared AR experience; determining, by the client device, that two or more users are located within a threshold proximity of the client device; and activating the selected shared AR experience in response to determining that the two or more users are located within the threshold proximity of the client device.
Image reader comprising CMOS based image sensor array
The invention features an image reader and a corresponding method for capturing a sharp distortion free image of a target, such as a one or two-dimensional bar code. In one embodiment, the image reader comprises a two-dimensional CMOS based image sensor array, a timing module, an illumination module, and a control module. The time during which the target is illuminated is referred to as the illumination period. The capture of the image by the image sensor array is driven by the timing module that, in one embodiment, is able to simultaneously expose substantially all of the pixels in the array. The time during which the pixels are collectively activated to photo-convert incident light into charge defines the exposure period for the sensor array. In one embodiment, at least a portion of the exposure period occurs during the illumination period.
Image reader comprising CMOS based image sensor array
The invention features an image reader and a corresponding method for capturing a sharp distortion free image of a target, such as a one or two-dimensional bar code. In one embodiment, the image reader comprises a two-dimensional CMOS based image sensor array, a timing module, an illumination module, and a control module. The time during which the target is illuminated is referred to as the illumination period. The capture of the image by the image sensor array is driven by the timing module that, in one embodiment, is able to simultaneously expose substantially all of the pixels in the array. The time during which the pixels are collectively activated to photo-convert incident light into charge defines the exposure period for the sensor array. In one embodiment, at least a portion of the exposure period occurs during the illumination period.
DETECTION OF FRAUDULENT DISPLAYABLE CODE DATA DURING DEVICE CAPTURE
There are provided systems and methods for detection of fraudulent displayable code data during device capture. A user may utilize a computing device to capture data at a certain location, such as imaging a QR code or reading an RFID reader. However, without knowing that those codes or devices are safe, the user make risk a computing attack on their device. Thus, processes herein provide a manner to detect when codes or devices are unsafe based on the additional data detected when encoded data is captured. In such instances, those codes and devices may be detected as fraudulent and the user may receive a warning of malicious computing attacks. Additionally, the user may be guided to valid codes and devices to utilize and may further receive information on removing such computing attacks.
GENERATING MEASUREMENT DATA USING IMAGE DATA
Aspects of the present invention disclose a method, computer program product, and system for determining information based on a received image. The method includes one or more processors receiving image data from a computing device. The method further includes one or more processors identifying an object included in the received image data. The method further includes one or more processors determining a value that corresponds to the identified object included in the received image data. The method further includes one or more processors determining whether the determined value corresponds to a defined action. Another aspect of the present invention discloses an apparatus that includes a foreground label overlaying a background label, and a measurement device coupled to the foreground label. The measurement device is capable of movement in response to observing measurement data.
Methods and a device for processor optimizations during item scanning and transaction processing
Processor utilization for a combined transaction terminal and scanner device is controlled during item code image capture, item code reading, and/or read item code communications. Item image capture rates, item image frame reads, and read item code communications are controlled to override preconfigured processing and to reduce processor utilization on the device. This frees up processor capacity for performing other operations during transactions on the device.
Detection of fraudulent displayable code data during device capture
There are provided systems and methods for detection of fraudulent displayable code data during device capture. A user may utilize a computing device to capture data at a certain location, such as imaging a QR code or reading an RFID reader. However, without knowing that those codes or devices are safe, the user make risk a computing attack on their device. Thus, processes herein provide a manner to detect when codes or devices are unsafe based on the additional data detected when encoded data is captured. In such instances, those codes and devices may be detected as fraudulent and the user may receive a warning of malicious computing attacks. Additionally, the user may be guided to valid codes and devices to utilize and may further receive information on removing such computing attacks.