Patent application number | Description | Published |
20130217440 | IMAGE PROCESSING ARCHITECTURES AND METHODS - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality is improved, and new functionality is provided. Some aspects relate to imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. A great number of other features and arrangements are also detailed. | 08-22-2013 |
20130223673 | METHODS AND ARRANGEMENTS FOR IDENTIFYING OBJECTS - In some arrangements, product packaging is digitally watermarked over most of its extent to facilitate high-throughput item identification at retail checkouts. Imagery captured by conventional or plenoptic cameras can be processed (e.g., by GPUs) to derive several different perspective-transformed views—further minimizing the need to manually reposition items for identification. Crinkles and other deformations in product packaging can be optically sensed, allowing such surfaces to be virtually flattened to aid identification. Piles of items can be 3D-modelled and virtually segmented into geometric primitives to aid identification, and to discover locations of obscured items. Other data (e.g., including data from sensors in aisles, shelves and carts, and gaze tracking for clues about visual saliency) can be used in assessing identification hypotheses about an item. A great variety of other features and arrangements are also detailed. | 08-29-2013 |
20130273968 | METHODS AND SYSTEMS FOR CONTENT PROCESSING - Cell phones and other portable devices are equipped with a variety of technologies by which existing functionality can be improved, and new functionality can be provided. Some aspects relate to data driven imaging architectures, in which a cell phone's image sensor is one in a chain of stages that successively act on packetized instructions/data, to capture and later process imagery. Other aspects relate to distribution of processing tasks between the device and remote resources (“the cloud”). Elemental image processing, such as filtering and edge detection—and even some simpler template matching operations—may be performed on the cell phone. Other operations are referred out to remote service providers. The remote service providers can be identified using techniques such as a reverse auction, though which they compete for processing tasks. Other aspects of the disclosed technologies relate to visual search capabilities, and determining appropriate actions responsive to different image inputs. Still others concern metadata generation, processing, and representation. Yet others relate to coping with fixed focus limitations of cell phone cameras, e.g., in reading digital watermark data. Still others concern user interface improvements. A great number of other features and arrangements are also detailed. | 10-17-2013 |
20130290379 | DOCUMENT PROCESSING METHODS - Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed. | 10-31-2013 |
20130308818 | CONTENT RECOGNITION AND SYNCHRONIZATION USING LOCAL CACHING - A content fingerprint based recognition system employs local caching of portions of a fingerprint database to manage network services for identifying which programs a user's mobile device is exposed to and the timing of events within the program. The system enables background recognition and synchronization of network services in a way that consumes less device power and bandwidth. | 11-21-2013 |
20130311329 | IMAGE-RELATED METHODS AND ARRANGEMENTS - In one aspect, a user captures an image of a physical object (e.g., of a grocery item, using a smartphone). The depicted object is identified, such as by extracting fingerprint or watermark data from the imagery. Other imagery depicting that object—or depicting related objects—is identified on the web, and is displayed to the user on the smartphone screen. The user may select one or more of these images and direct that they be posted to a social network account (e.g., Pinterest) associated with the user. In another aspect, the user's location is sensed (e.g., an aisle of a department store), and a collection of images depicting nearby products is presented to the user for selection and posting to a social networking service. A great variety of other features and arrangements are also detailed. | 11-21-2013 |
20130314541 | METHODS AND ARRANGEMENTS FOR OBJECT POSE ESTIMATION - In an illustrative embodiment, the free space attenuation of illumination with distance, according to a square law relationship, is used to estimate the distance between a light source and two or more different areas on the surface of a product package. By reference to these distance estimates, the angular pose of the object surface is determined. | 11-28-2013 |
20130316728 | POSITIONING SYSTEMS FOR WIRELESS NETWORKS - The invention provides a method of computing positioning of a mobile device in a wireless network. This positioning method receives associated pings exchanged among a network of nodes. The pings include count stamps of ping transmit and receipt, and a count stamp of a message received by the network nodes from the mobile device. The method evaluates count stamps to determine clock differences among clocks of the network nodes. From the clock differences, the method determines pseudo ranges between the network nodes and the mobile device. The method determines location of the mobile device by evaluating the differences between ranges of candidate positions of the mobile device and the pseudo ranges. It minimizing a function of error associated with the position candidates to determine the mobile device's location. | 11-28-2013 |
20130340011 | SECOND SCREENS AND WIDGETS - Cell phones and other devices are used to complement enjoyment of television or other video media, through use of corresponding software applications (“widgets”). A great variety of related features and arrangements are particularly detailed. | 12-19-2013 |
20140108020 | MULTI-MODE AUDIO RECOGNITION AND AUXILIARY DATA ENCODING AND DECODING - Audio signal processing enhances audio watermark embedding and detecting processes. Audio signal processes include audio classification and adapting watermark embedding and detecting based on classification. Advances in audio watermark design include adaptive watermark signal structure data protocols, perceptual models, and insertion methods. Perceptual and robustness evaluation is integrated into audio watermark embedding to optimize audio quality relative the original signal, and to optimize robustness or data capacity. These methods are applied to audio segments in audio embedder and detector configurations to support real time operation. Feature extraction and matching are also used to adapt audio watermark embedding and detecting. | 04-17-2014 |
20140119593 | DETERMINING POSE FOR USE WITH DIGITAL WATERMARKING, FINGERPRINTING AND AUGMENTED REALITY - Image recognition and augmented reality experiences utilize auxiliary data extracted from an image or video, or image fingerprints, or a combination of both. One claim recites a method comprising: receiving a plurality of imagery frames captured by a device sensor; identifying a plurality of key points in each of the plurality of imagery frames; resolving image pose by utilizing relative relationships of the key points between different frames of the plurality of frames; modifying imagery of at least one of the plurality of frames based on resolved image pose; and deriving a fingerprint from modified imagery. Of course other claims and combinations are provided as well. | 05-01-2014 |
20140147010 | Determining Proximity of a Camera to a Subject Based on Shadow Analysis - The present disclosure relates generally to cell phones and cameras, and to shadow analysis in images captured by such cell phones and cameras. One claim recites a smart phone comprising: a camera; and one or more processors programmed for: i) identifying a shadow cast by the smart phone or camera on a subject being imaged by a camera; and ii) determining a proximity of the camera to the subject based on an analysis of the shadow. Of course, other claims and combinations are provided too. | 05-29-2014 |
20140164124 | LOCATION BASED ROUTER - A location based router system comprises a router in communication with an ad hoc network of devices, including at least one mobile device. The router directs packets from the network to associated agents. The router receives queries from requesting clients, such as the mobile device, and provides location to the requesting client. Additionally, depending on preferences of the client, it also routes market packets for location based services back to the mobile device dependent on its location. | 06-12-2014 |
20140244494 | METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS - To make a payment, a smartphone presents artwork for a payment card (e.g., a Visa card) that has been selected by a user from a virtual wallet of such cards. Encoded in the displayed artwork is payment information that has been encrypted with a context-dependent session key. A cooperating system (e.g., a retailer's point of sale system) uses a camera to capture an image of the artwork, and independently creates the session key from its own context sensor(s), enabling decryption of the payment information. Such technology provides a superior transaction security model at a fraction of the cost of competing chip card payment systems (which require, e.g., expensive physical cards, and single-purpose reader hardware). A great variety of other features and arrangements are also detailed. | 08-28-2014 |