Abstract:
The present invention encompasses a self-orthogonal character recognition engine for executing an iterative method employing a database of predetermined character strings. The method receives a digital representation of a character string (Figure 6). It then generates a proposed result string by applying to the captured digital image a predetermined recognition routine including one or more recognition subroutines. Each recognition subroutine employs an initial parameter setting. Next, if the proposed result string does not match any of the predetermined character strings in the database, the initial parameter setting of a recognition subroutine is changed to a next setting (628, 630). The recognition process is then repeated using the next parameter setting to generate and test a next result string. The process can be repeated iteratively until a result string is verified or the process times out (502, 504, 506, 510).
Abstract:
Human and machine readability of pre-printed forms that have been completed with user data is impeded where the user data overlaps zone descriptions, constraint boxes or other markings of the pre-printed form. A "form fracturing" methodology is described that includes processing the composite-image data so as to attach one or more shared pixels to a non-diagonally adjacent data pixel. The remaining form pixels can be removed, resulting in at least a useful approximation and often a complete recovery of the user data. Where blank-form data is not available, a "virtual dropout" technique allows for recovering user data from a pre-printed form using limited speckle size and configurations, constraining gray-scale value, or a combination of the two. The disclosed methodologies are conveniently implemented in software on any digital processor.
Abstract:
A limited-access database system is designed for rapid access of data records with reduced memory storage requirements. The database system employs a set of obfuscated data records stored in data crystals that can only be accessed and read by an iterator, which is not directly accessible by the users of the database. The iterator accesses information responsive to a predefined query sent from a customer application. Rather than providing general tools to customers for constructing any possible queries, such as is done in structured query language database systems, database systems embodying the present invention allow only predefined types of queries to be used by customer applications. By restricting the types of queries customer applications can call, valuable data records remain secure from unauthorized reconstruction or duplication while still allowing limited access for specific purposes.
Abstract:
Embodiments of the present invention encompass systems and methods for use in identity authentication. One illustrative application is in the context of authenticating the identity of a subject (108) by verifying items of identifying information stored by, or accessible through, a plurality of data sources (112a-112d). In particular, a multi-item query (120a-120d) can be presented to multiple data sources (112a-112d) and the results of the query (122a-122d) can be combined into an overall composite result that can be used to authenticate the subject's identity.
Abstract:
This disclosure pertains to weighing a physical item while it is moving in a servo-driven conveyor system for e-commerce, logistics, manufacturing and other applications. The introduction of an unknown mass to an electro-mechanical feedback or filter network controlling a conveyance system will modify the steady state behavior of that system in such a way that measuring the phase or frequency shift of an input signal or oscillation will enable us to infer the magnitude of that mass.
Abstract:
Methods, software and apparatus (FIG. 5) disclosed to maintain and update an association database (650) that enables relating updated address information to affected mailpieces (FIG. 7), and providing the benefits of that information to mailers, especially business or corporate mailers (600, 630, 632), and in the case of co-mingled mail, enabling a pre-sort house (610) to provide the updated information to their customers, or to update mailing lists maintained by or for their customers.
Abstract:
Improvements are disclosed for automatically routing items, such as mail-piece items (Fig. 2), in support of efficiently and correctly delivering them to an intended destination. A destination address is read by a recognizer (12) but it may be too ambiguous (14,18) initially for routing the piece. The addressee name is also read (24), and the recognizer data is provided to a directory (26) that accesses a name + address database (28). The addressee name is used to disambiguate the recognizer address data (26,30) and thereby properly route the piece (32). In addition, the name + address directory (42,44) can detect incorrect address data (42,50), and notwithstanding the incorrect address, correctly routing the item (52,46) to the intended addressee based on the recognized addressee name (40).
Abstract:
Methods and apparatus for weighing an article, such as a mail piece, while the article is moving, for example along a transport path. In one embodiment, a weigh station comprises a servo motor (110) driven by a servo feed back loop (126, 128) to maintain a selected speed setting (130). When an article is introduced, an impulse is applied to the article sufficient to change its state of motion from its initial state to the selected speed setting. That impulse is applied by the servo motor (110), and the system captures data indicative of the applied impulse, by monitoring the motor current (140, 142). A processor (140) or software converts the captured data to determine a weight of the article, based on stored calibration data (148).
Abstract:
Improvements are disclosed for automatically routing items, such as mail-piece items (Fig. 2), in support of efficiently and correctly delivering them to an intended destination. A destination address is read by a recognizer (12) but it may be too ambiguous (14,18) initially for routing the piece. The addressee name is also read (24), and the recognizer data is provided to a directory (26) that accesses a name + address database (28). The addressee name is used to disambiguate the recognizer address data (26,30) and thereby properly route the piece (32). In addition, the name + address directory (42,44) can detect incorrect address data (42,50), and notwithstanding the incorrect address, correctly routing the item (52,46) to the intended addressee based on the recognized addressee name (40).
Abstract:
The verification engine (100) includes various components which include a client interface (102), a database interface (104), and the verification core (106). A subject (108) that either gives or requires authentication communicates with an authentication client (110). The subject (108) can provide identifying information to the authentication client (110), and the subject (108) can also answer queries posed by the authentication client (110). The authentication client (110) gives and receives information to and from the verification core (106) through the client interface (102). The verification core can then provide the information identifying the subject (108) to one or more independent, third-party databases (112a-112d) for authentication database "n" (112d) illustrates that a potentially unlimited number of independent database can be provided for authentication with the verification engine (100). After the subject (108) has identified himself to the authentication client (110), the authentication client (11) can present a predefined query (114) to the subject (108). The actual question and scope of the query depend on the authentication services being provided by the authentication client (11). The subject (108) then returns a response to the query (116). The authentication client (110) then forwards (118) verification engine (100) then transmits (120a-120d) the response from the subject (108) to multiple databases (112a-112d). Each database (112a-112d) that receives the information checks it against the identifying information it stores for the subject (108) and returns a confidence indication (112a-112d) to the verification engine (100). The verification engine (100) combines the individual confidence indications (112a-112d) into a combined confidence indication (124) that is provided to the authentication client (110) for authenticating the subject (108).