USING MOTION TRACKING AND IMAGE CATEGORIZATION FOR DOCUMENT INDEXING AND VALIDATION
First Claim
1. A method comprising:
- causing a graphic user interface of a device to display an initial instruction to obtain continuous video that positions all of an item within a field of view of a camera of said device;
automatically recognizing identified features of said item from a full-view video frame of said continuous video obtained when all of said item was within said field of view of said camera, using a processor in communication with said camera;
after displaying said initial instruction, causing said graphic user interface to display a subsequent instruction to zoom in on said item and position only a portion of said item within said field of view of said camera while continuing to obtain said continuous video;
automatically recognizing patterns from a zoom-in video frame of said continuous video obtained when only said portion of said item occupied all of said field of view of said camera, using said processor; and
performing an authentication process using said identified features and said patterns to determine whether said item is valid, using said processor.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods include an application operating on a device. The application causes the graphic user interface of the device to display an initial instruction to obtain a full-view image that positions all of an item within a field of view of a camera on the device. The application automatically recognizes identified features of the full-view image, by using a processor in communication with the camera. After displaying the initial instruction, the application causes the graphic user interface to display a subsequent instruction to obtain a zoom-in image that positions only a portion of the item within the field of view of the camera. Also the application automatically recognizes patterns from the zoom-in image, using the processor. Furthermore the application performs an authentication process using the identified features and the patterns to determine whether the item is valid, using the processor.
10 Citations
20 Claims
-
1. A method comprising:
-
causing a graphic user interface of a device to display an initial instruction to obtain continuous video that positions all of an item within a field of view of a camera of said device; automatically recognizing identified features of said item from a full-view video frame of said continuous video obtained when all of said item was within said field of view of said camera, using a processor in communication with said camera; after displaying said initial instruction, causing said graphic user interface to display a subsequent instruction to zoom in on said item and position only a portion of said item within said field of view of said camera while continuing to obtain said continuous video; automatically recognizing patterns from a zoom-in video frame of said continuous video obtained when only said portion of said item occupied all of said field of view of said camera, using said processor; and performing an authentication process using said identified features and said patterns to determine whether said item is valid, using said processor. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
causing a graphic user interface of a device to display an initial instruction to obtain a full-view image that positions all of an item within a field of view of a camera of said device; automatically recognizing identified features of said full-view image, using a processor in communication with said camera; after displaying said initial instruction, causing said graphic user interface to display a subsequent instruction to obtain a zoom-in image that positions only a portion of said item within said field of view of said camera; automatically recognizing patterns from said zoom-in image, using said processor; and performing an authentication process using said identified features and said patterns to determine whether said item is valid, using said processor. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
an application operating on a device, said application causing a graphic user interface of said device to display an initial instruction to obtain continuous video that positions all of an item within a field of view of a camera of said device, said application automatically recognizing identified features of said item from a full-view video frame of said continuous video obtained when all of said item was within said field of view of said camera, using a processor in communication with said camera, after displaying said initial instruction, said application causing said graphic user interface to display a subsequent instruction to zoom in on said item and position only a portion of said item within said field of view of said camera while continuing to obtain said continuous video, said application automatically recognizing patterns from a zoom-in video frame of said continuous video obtained when only said portion of said item occupied said field of view of said camera, using said processor, and said application performing an authentication process using said identified features and said patterns to determine whether said item is valid, using said processor. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
an application operating on a device, said application causing a graphic user interface of a device to display an initial instruction to obtain a full-view image that positions all of an item within a field of view of a camera of said device, said application automatically recognizing identified features of said full-view image, using a processor in communication with said camera, after displaying said initial instruction, said application causing said graphic user interface to display a subsequent instruction to obtain a zoom-in image that positions only a portion of said item within said field of view of said camera, said application automatically recognizing patterns from said zoom-in image, using said processor, and said application performing an authentication process using said identified features and said patterns to determine whether said item is valid, using said processor. - View Dependent Claims (17, 18, 19, 20)
-
Specification