Cognitive image detection and recognition
First Claim
1. A computer implemented method configured to determine that a non-trusted data set is associated with a trusted data set, the computer implemented method comprising;
- receiving, at a user interface of an image processing station, the non-trusted data set from a user;
capturing, at a trusted data source of the user interface, the trusted data set;
wherein the non-trusted data set received from the user has not been associated with the trusted data set;
wherein the trusted data set captured at the trusted data source of the user interface does not include the non-trusted data set;
receiving, at a processor system of the image processing station communicatively coupled to a memory and the user interface, the trusted data set and the non-trusted data set;
analyzing, using the processor system of the image processing station, the trusted data set and the non-trusted data set to determine one or more relationships between the trusted data set and the non-trusted data set; and
generating, using the processor system of the image processing station, based at least in part on an output from analyzing the trusted data set and the non-trusted data set to determine one or more relationships between the trusted data set and the non-trusted data set, a confidence value that represents a probability that at least a portion of the non-trusted data set identifies at least a portion of the trusted data set; and
making a determination that the trusted data set is associated with the non-trusted data set based at least in part on the confidence value;
wherein the computer implemented method assumes that the non-trusted data set is not associated with the trusted data set until the computer implemented method makes the determination that the trusted data set is associated with the non-trusted data set.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed to an image processing station for associating a non-trusted data set with a trusted data set. The station includes a memory and a user interface configured to receive the trusted data set and the non-trusted data set. The station further includes a processor system communicatively coupled to the memory and the user interface. The processor system is configured to generate, based at least in part on processing the trusted data set and the non-trusted data set, a confidence value that represents a probability that at least a portion of the non-trusted data set identifies at least a portion of the trusted data set.
-
Citations
5 Claims
-
1. A computer implemented method configured to determine that a non-trusted data set is associated with a trusted data set, the computer implemented method comprising;
-
receiving, at a user interface of an image processing station, the non-trusted data set from a user; capturing, at a trusted data source of the user interface, the trusted data set; wherein the non-trusted data set received from the user has not been associated with the trusted data set; wherein the trusted data set captured at the trusted data source of the user interface does not include the non-trusted data set; receiving, at a processor system of the image processing station communicatively coupled to a memory and the user interface, the trusted data set and the non-trusted data set; analyzing, using the processor system of the image processing station, the trusted data set and the non-trusted data set to determine one or more relationships between the trusted data set and the non-trusted data set; and generating, using the processor system of the image processing station, based at least in part on an output from analyzing the trusted data set and the non-trusted data set to determine one or more relationships between the trusted data set and the non-trusted data set, a confidence value that represents a probability that at least a portion of the non-trusted data set identifies at least a portion of the trusted data set; and making a determination that the trusted data set is associated with the non-trusted data set based at least in part on the confidence value; wherein the computer implemented method assumes that the non-trusted data set is not associated with the trusted data set until the computer implemented method makes the determination that the trusted data set is associated with the non-trusted data set. - View Dependent Claims (2, 3, 4, 5)
-
Specification