Attributes of captured objects in a capture system
First Claim
Patent Images
1. A method, comprising:
- generating, by a computing device, one or more signatures for a first document;
registering the first document by storing the one or more signatures in a signature database;
querying the signature database to compare one or more signatures of a captured object to the one or more signatures of the first document, wherein the captured object is included in a second document sought for transmission in a network;
normalizing at least a portion of the second document into normalized text content before identifying the captured object in the second document, wherein the normalizing includes comparing normalization patterns to one or more source strings in the second document, wherein the comparing is performed on a source string of the one or more source strings according to a sequenced order of the normalization patterns from a more restrictive normalization pattern to a less restrictive normalization pattern, wherein the source string is normalized into at least a portion of the normalized text content based on a first match found during the comparison of the source string to the normalization patterns, wherein the normalized text content is tokenized into a list of tokens, and wherein the one or more signatures of the captured object are generated from the list of tokens; and
detecting an unauthorized transfer of registered content based on matching at least one of the signatures of the captured object to at least one of the signatures of the first document.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for capturing objects and balancing systems resources in a capture system are described. An object is captured, metadata associated with the objected generated, and the object and metadata stored.
410 Citations
16 Claims
-
1. A method, comprising:
-
generating, by a computing device, one or more signatures for a first document; registering the first document by storing the one or more signatures in a signature database; querying the signature database to compare one or more signatures of a captured object to the one or more signatures of the first document, wherein the captured object is included in a second document sought for transmission in a network; normalizing at least a portion of the second document into normalized text content before identifying the captured object in the second document, wherein the normalizing includes comparing normalization patterns to one or more source strings in the second document, wherein the comparing is performed on a source string of the one or more source strings according to a sequenced order of the normalization patterns from a more restrictive normalization pattern to a less restrictive normalization pattern, wherein the source string is normalized into at least a portion of the normalized text content based on a first match found during the comparison of the source string to the normalization patterns, wherein the normalized text content is tokenized into a list of tokens, and wherein the one or more signatures of the captured object are generated from the list of tokens; and detecting an unauthorized transfer of registered content based on matching at least one of the signatures of the captured object to at least one of the signatures of the first document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. At least one non-transitory machine-readable medium having instructions stored therein and when executed, the instructions cause one or more processors to:
-
generate one or more signatures for a first document; register the first document by storing the one or more signatures in a signature database; query the signature database to compare one or more signatures of a captured object to the one or more signatures of the first document, wherein the captured object is included in a second document sought for transmission in a network; normalize at least a portion of the second document into normalized text content before identifying the captured object in the second document, wherein the normalizing includes comparing normalization patterns to one or more source strings in the second document, wherein the comparing is performed on a source string of the one or more source strings according to a sequenced order of the normalization patterns from a more restrictive normalization pattern to a less restrictive normalization pattern, wherein the source string is normalized into at least a portion of the normalized text content based on a first match found during the comparison of the source string to the normalization patterns, wherein the normalized text content is tokenized into a list of tokens, and wherein the one or more signatures of the captured object are generated from the list of tokens; and detect an unauthorized transfer of registered content based on matching at least one of the signatures of the captured object to at least one of the signatures of the first document. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification