Patent classifications
G06K19/14
Mobile robot map generation
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.
Mobile robot map generation
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The robot can patrol one or more routes within a building, and can detect violations of security policies by objects, building infrastructure and security systems, or individuals. In response to the detected violations, the robot can perform one or more security operations. The robot can include a removable fabric panel, enabling sensors within the robot body to capture signals that propagate through the fabric. In addition, the robot can scan RFID tags of objects within an area, for instance coupled to store inventory. Likewise, the robot can generate or update one or more semantic maps for use by the robot in navigating an area and for measuring compliance with security policies.
METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
METHOD AND DEVICE FOR DETECTING UNAUTHORIZED TRANFER BETWEEN PERSONS
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Method of forming a fabric containing a functional code pattern
A method of producing a textile product wherein a functional code pattern is structurally embedded within a textile product as the textile yarns are interlaced to become a textile product is provided. The functional code pattern is embedded within the textile product by programming a textile process machine with conversion factors and mathematical ratios, producing an enlarged code pattern that adheres to the customary rules of public or proprietary barcode formatting. Alternatively, the functional code pattern can be digitally printed onto the textile. The resulting textile product includes a functional and decorative code pattern that is readable by a standard electronic code reading device. Depending upon the type of textile yarn materials used, the code pattern created in or printed on the textile fabric may or may not be visible to the human eye.
Standardization of Taggant Signatures Using Transfer Images
The present invention allows spectral codes to be accurately and consistently deployed for a wide range of labels and substrates or products. Spectral codes provided by one or more taggants are incorporated into transferable images so that these images can be prepared separately under accurate, controlled conditions and then transferred onto labels or other substrates. The transferable images that include one or more taggants further include a metal foil layer that is both highly opaque and thin so that the foil is highly compatible with image transfer techniques.
Providing and reading a marking on an item
Provided is a method for marking an item comprising the steps of providing a first predetermined marking on the item; providing a second predetermined marking on the item at least partially overlapping with the first marking; and determining information dependent on a relationship between the first marking provided on the item and the second marking provided on the item. Further is provided an apparatus for providing a marking on an item, an apparatus for reading a marking on an item, a computer program, and a computer program product.
INFORMATION PROCESSING SYSTEM, INFORMATION CODE GENERATING SYSTEM, INFORMATION PROCESSING METHOD, AND INFORMATION CODE GENERATING METHOD
To easily determine whether an information code has been replaced, an information processing device obtains, based on original information obtained by photographing an optically readable information code and decoding the same, first class information indicating a class into which an object visually represented by first visual information which should be displayed together with an information code is classified. The information processing device obtains second class information indicating a class into which an object visually represented by second visual information photographed together with the information code because of display together with the information code is classified. The information processing device compares the first class information with the second class information. The information processing device controls, based on a result of the comparison, execution of predetermined processing using the original information.
INFORMATION PROCESSING SYSTEM, INFORMATION CODE GENERATING SYSTEM, INFORMATION PROCESSING METHOD, AND INFORMATION CODE GENERATING METHOD
To easily determine whether an information code has been replaced, an information processing device obtains, based on original information obtained by photographing an optically readable information code and decoding the same, first class information indicating a class into which an object visually represented by first visual information which should be displayed together with an information code is classified. The information processing device obtains second class information indicating a class into which an object visually represented by second visual information photographed together with the information code because of display together with the information code is classified. The information processing device compares the first class information with the second class information. The information processing device controls, based on a result of the comparison, execution of predetermined processing using the original information.
INTELLIGENT SYSTEM FOR AUTHENTICATION OF HANDMADE CARPET
The invention “Intelligent system for authentication of handmade carpet”, is a system which integrates digital technologies including the Internet of Things (IoT) image processing, steganography, blockchain, asymmetric encryption and mobile technology to issue an irrevocable and immutable digital certificate for a handmade carpet and store it on the blockchain. This invention is intended to generate the fingerprint for a handmade carpet and share unique features, and journeys of this product among potential customers with data-backed evidence in a method that is accessible, trustworthy, and secure. The aim is to verify the provenance and crackdown and report counterfeit(s). This invention is very appealing for new carpets and creates substantial values for carpets which are about to be woven.