Various embodiments described herein relate generally to the field of image capture using a mobile device. More particularly, various embodiments are directed to integrating mobile image capture with an internet-browser application on the mobile device.
Mobile phone adoption continues to escalate, including ever-growing smart phone adoption and tablet usage. Mobile imaging is a discipline where a consumer takes a picture of a document, and that document is processed, extracting and extending the data contained within it for selected purposes. The convenience of this technique is powerful and is currently driving a desire for this technology throughout financial services and other industries.
Numerous applications utilizing mobile image capture have been developed for various financial services such as check deposits, bill pay, credit card balance transfers, and insurance account services, to name a few. These applications rely on the use of a third party application running on the mobile device that is managed by the service provider, such as a bank, utility or insurance company. The mobile image capture process is built into the third party application and is often customized for the particular third party service through the use of specific user interfaces and image capture parameters that are designed to capture certain types of documents with known properties and content. The mobile image capture process is therefore limited to use only within the specific third party application and cannot be utilized for another purpose for which it has not already been integrated. This effectively prevents the use of mobile image capture for mobile devices which do not run these third party applications or for services which are accessed through a mobile web browser instead of the third party application that is resident on the mobile device.
Therefore, it is desirable to broaden the use of mobile image capture for use with additional services and platforms available on the mobile device.
Disclosed herein are systems and methods for integrating mobile image capture with an internet browser application on a mobile device. Various embodiments provide for a user viewing a web page via the internet browser application to initiate a mobile image capture process on the mobile device through the web page, capture one or more images with a mobile image capture user interface, and then provide secure access to the one or more captured images for the web page to utilize the content of the one or more captured images. The mobile image capture process is accessible through any internet browser application via the mobile device and allows any service running on a web page to benefit from the ability to capture an image on the mobile device and obtain the content of the image through mobile image processing.
Other features and advantages should become apparent from the following description of the preferred embodiments, taken in conjunction with the accompanying drawings.
Various embodiments disclosed herein are described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict typical or exemplary embodiments. These drawings are provided to facilitate the reader's understanding and shall not be considered limiting of the breadth, scope, or applicability of the embodiments. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.
The various embodiments mentioned above are described in further detail with reference to the aforementioned figured and the following detailed description of exemplary embodiments.
The embodiments described herein provide for an internet browser application running on a mobile device to interface with a mobile image capture application running on the mobile device to provide for mobile image capture and processing for web-based services accessible through web pages on the internet browser application. This browser-based mobile image capture allows services which do not provide downloadable applications that run on the mobile device to utilize mobile image capture and processing features through the web browser. Additionally, mobile devices which do not provide or have access to third party applications can also utilize mobile image capture and processing. Furthermore, a mobile image capture application may be run on the mobile device as a standalone image capture application by the user of the mobile device in order to utilize the image capture and processing features apart from a related application.
System Overview
The mobile device is also configured to run a micro application (“MicroApp”) which interfaces with the browser to receive a request for mobile image capture, initiates a mobile image capture application and coordinates the transmission of the captured images to a remote server. The micro application also coordinates the transmission of schema from the browser to the mobile image capture application and the server which may pertain to the destination URL for the captured images or image capture settings to use when capturing the at least one image using the mobile device. In one embodiment, the schema may be transmitted using a JSON (JavaScript Object Notation) format. The mobile image capture application utilizes a camera on the mobile device and provides a user interface that allows a user to capture one or more high quality images with content that is needed for the web-based services. The features of the mobile image capture application provide for the user to easily and quickly capture high quality images of content with the mobile device, such as documents, financial papers, identification cards, license plates, vehicle identification numbers (VIN) and other words, numbers and symbols that may be needed by a web-based service and which would otherwise require manual entry of the content through more cumbersome entry methods such as typing or touch-based inputs.
The server may be configured to receive the one or more captured images from the micro application and store the captured images in a connected database for access by the web-based service. The server may also receive the schema from the micro application with the data on the destination for the captured images. The captured images may be securely stored and provide limited access using a token-based system or other secure protocol to ensure that the captured images and any content extracted therefrom are utilized only for the specific service that the user selects. The server may then send a response to the micro application confirming that the image and related data has been received and stored, which may prompt the micro application to close and return the user to the browser application. As will be described in further detail below, the captured images may then be requested (securely via the token) by the web-based service that the user is accessing with the internet browser on the mobile device, after which the captured images are transmitted to servers for the web-based service (not illustrated herein) at the destination URL provided in the schema. In one embodiment, the servers for the web-based service may perform image correction on the received images to obtain images which meet certain standards and requirements for content extraction such that the content can be extracted with a high degree of confidence. The servers for the web-based service may then perform content extraction steps on the corrected images in order to produce a content file of the extracted content for use by the web-based service.
In an alternate embodiment illustrated in
It should be noted that although the micro application and mobile image capture (or “MiSnap”) application are illustrated as separate applications, they may be integrated into a single application that is executable on the mobile device rather than separate applications which require separate executions. The configurability of the applications may depend upon the operating system of the mobile device, but will nonetheless provide the same functionality regardless of the integration or separation of these applications.
Exemplary Method
One embodiment of a method for browser-based mobile image capture is illustrated in
Once the mobile image capture application is initiated, the camera on the mobile device is utilized along with a user interface which provides for automatic capture of images of a document or other content based on the schema passed in through the hyperlink. When the image or images have been captured, the mobile image capture application terminates. The micro application then determines whether the captured images were requested by the browser (Invoke—Yes) and transmits the captured images to the server. If the captured images were requested by other means (Invoke—No), the captured images may be saved within the memory of the mobile device or sent to a destination selected by the user using a user interface provided by the micro application.
When the captured images are transmitted to the server, a token is also created and stored at the server along with the captured images. The token is designed to prevent unauthorized access to the captured image, and may be created with data from one or more criteria which is associated with the captured images, such as a time stamp of the time the images were created, a device identifier which uniquely identified the mobile device which captured the images, or a user identifier for the user of the mobile device that the user has set up with the web page service provider, phone carrier or through the micro application. The token may also be instance specific in that it can only be used once, or it must be used within a certain period of time before it expires. The captured images can only be transmitted from the server when a proper request is made which identifies the address where the images are stored on the server (server URL) and provides the token which matches the token stored at the server. Once the token and captured images are transmitted to the server, the micro application terminates and the mobile device returns the user to the browser application. The browser application is still displaying the browser session with the web page that requested the captured images, and the browser can either automatically request the captured images or wait for the user to select a link to then request that the captured images be transmitted to the server for the web page.
Additional Applications
In another embodiment, the internet browser may be configured to operate within the micro application such that the user uses the micro application to access the web page for the web service that requires mobile image capture. The embedded browser functionality within the micro application provides for streamlined functionality between the browser, micro application and mobile image capture application since the entire user interface and browser functionality takes place within a single application on the mobile device.
In another embodiment, the micro application may also provide independent functionality as a generic mobile image capture application which can be invoked separately from the internet browser where the user would like to capture one or more images of content for their own use or for use with an application that provides for uploading the image through another application or other communication means. For example, a service may require that an image be captured and then sent via a text message or e-mail message to an address for image processing and content extraction. The user could then initiate the micro application in the Generic Mode shown in
Computer-Implemented Embodiment
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not of limitation. The breadth and scope should not be limited by any of the above-described exemplary embodiments. Where this document refers to technologies that would be apparent or known to one of ordinary skill in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future. In addition, the described embodiments are not restricted to the illustrated example architectures or configurations, but the desired features can be implemented using a variety of alternative architectures and configurations. As will become apparent to one of ordinary skill in the art after reading this document, the illustrated embodiments and their various alternatives can be implemented without confinement to the illustrated example. One of ordinary skill in the art would also understand how alternative functional, logical or physical partitioning and configurations could be utilized to implement the desired features of the described embodiments.
Furthermore, although items, elements or components may be described or claimed in the singular, the plural is contemplated to be within the scope thereof unless limitation to the singular is explicitly stated. The presence of broadening words and phrases such as “one or more,” “at least,” “but not limited to” or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent.
This application is a continuation of U.S. patent application Ser. No. 14/568,085, filed on Dec. 11, 2014, which claims priority to U.S. Provisional Patent App. No. 61/914,847, filed on Dec. 11, 2013, and is a continuation in part of U.S. patent application Ser. No. 14/042,677, filed on Sep. 30, 2013, U.S. patent application Ser. No. 14/042,719, filed on Sep. 30, 2013, and U.S. patent application Ser. No. 13/769,833, filed on Feb. 19, 2013, which are all hereby incorporated herein by reference as if set forth in full.
Number | Name | Date | Kind |
---|---|---|---|
5600732 | Ott et al. | Feb 1997 | A |
5751841 | Leong et al. | May 1998 | A |
5761686 | Bloomberg | Jun 1998 | A |
6038351 | Rigakos | Mar 2000 | A |
6038553 | Hyde, Jr. | Mar 2000 | A |
6345130 | Dahl | Feb 2002 | B1 |
6621919 | Mennie et al. | Sep 2003 | B2 |
6735341 | Horie et al. | May 2004 | B1 |
6807294 | Yamazaki | Oct 2004 | B2 |
6947610 | Sun | Sep 2005 | B2 |
6985631 | Zhang | Jan 2006 | B2 |
7020320 | Filatov | Mar 2006 | B2 |
7245765 | Myers et al. | Jul 2007 | B2 |
7283656 | Blake et al. | Oct 2007 | B2 |
7331523 | Meier et al. | Feb 2008 | B2 |
7376258 | Klein et al. | May 2008 | B2 |
7377425 | Ma et al. | May 2008 | B1 |
7426316 | Vehviläinen | Sep 2008 | B2 |
7433098 | Klein et al. | Oct 2008 | B2 |
7548641 | Gilson et al. | Jun 2009 | B2 |
7558418 | Verma et al. | Jul 2009 | B2 |
7593595 | Heaney, Jr. et al. | Sep 2009 | B2 |
7606741 | King et al. | Oct 2009 | B2 |
7735721 | Ma et al. | Jun 2010 | B1 |
7869098 | Corso et al. | Jan 2011 | B2 |
7949176 | Nepomniachtchi | May 2011 | B2 |
7950698 | Popadic et al. | May 2011 | B2 |
7953268 | Nepomniachtchi | May 2011 | B2 |
7982770 | Kahn et al. | May 2011 | B1 |
7978900 | Nepomniachtchi et al. | Jul 2011 | B2 |
7983468 | Ibikunle et al. | Jul 2011 | B2 |
7986346 | Kaneda et al. | Jul 2011 | B2 |
7996317 | Gurz | Aug 2011 | B1 |
8000514 | Nepomniachtchi et al. | Aug 2011 | B2 |
8023155 | Jiang | Sep 2011 | B2 |
8118216 | Hoch et al. | Feb 2012 | B2 |
8126252 | Abernethy et al. | Feb 2012 | B2 |
8180137 | Faulkner et al. | May 2012 | B2 |
8290237 | Burks et al. | Oct 2012 | B1 |
8300917 | Borgia et al. | Oct 2012 | B2 |
8320657 | Burks et al. | Nov 2012 | B1 |
8339642 | Ono | Dec 2012 | B2 |
8379914 | Nepomniachtchi et al. | Feb 2013 | B2 |
8442844 | Trandal et al. | May 2013 | B1 |
8532419 | Coleman | Sep 2013 | B2 |
8538124 | Harpel et al. | Sep 2013 | B1 |
8559766 | Tilt et al. | Oct 2013 | B2 |
8699779 | Prasad et al. | Apr 2014 | B1 |
9460141 | Coman | Oct 2016 | B1 |
20010014183 | Sansom-Wai et al. | Aug 2001 | A1 |
20010016084 | Pollard et al. | Aug 2001 | A1 |
20010019664 | Pilu | Sep 2001 | A1 |
20020003896 | Yamazaki | Jan 2002 | A1 |
20020012462 | Fujiwara | Jan 2002 | A1 |
20020041717 | Murata et al. | Apr 2002 | A1 |
20020067846 | Foley | Jun 2002 | A1 |
20030072568 | Lin et al. | Apr 2003 | A1 |
20030086615 | Dance et al. | May 2003 | A1 |
20030161523 | Moon et al. | Aug 2003 | A1 |
20030177100 | Filatov | Sep 2003 | A1 |
20040012679 | Fan | Jan 2004 | A1 |
20040213434 | Emerson et al. | Oct 2004 | A1 |
20040218799 | Mastie et al. | Nov 2004 | A1 |
20050011957 | Attia et al. | Jan 2005 | A1 |
20050065893 | Josephson | Mar 2005 | A1 |
20050097046 | Singfield | May 2005 | A1 |
20050100216 | Myers et al. | May 2005 | A1 |
20050143136 | Lev et al. | Jun 2005 | A1 |
20050196071 | Prakash et al. | Sep 2005 | A1 |
20050213805 | Blake et al. | Sep 2005 | A1 |
20050219367 | Kanda et al. | Oct 2005 | A1 |
20050220324 | Klein et al. | Oct 2005 | A1 |
20050242186 | Ohbuchi | Nov 2005 | A1 |
20050261990 | Gocht et al. | Nov 2005 | A1 |
20060008167 | Yu et al. | Jan 2006 | A1 |
20060012699 | Miki | Jan 2006 | A1 |
20060045379 | Heaney et al. | Mar 2006 | A1 |
20060071950 | Kurzweil et al. | Apr 2006 | A1 |
20060072822 | Hatzav et al. | Apr 2006 | A1 |
20060140504 | Fujimoto et al. | Jun 2006 | A1 |
20060164682 | Lev | Jul 2006 | A1 |
20060177118 | Ibikunle et al. | Aug 2006 | A1 |
20060182331 | Gilson et al. | Aug 2006 | A1 |
20060210192 | Orhun | Sep 2006 | A1 |
20060221415 | Kawamoto | Oct 2006 | A1 |
20060280354 | Murray | Dec 2006 | A1 |
20060291727 | Bargeron | Dec 2006 | A1 |
20070053574 | Verma et al. | Mar 2007 | A1 |
20070058851 | Quine et al. | Mar 2007 | A1 |
20070076940 | Goodall et al. | Apr 2007 | A1 |
20070081796 | Fredlund et al. | Apr 2007 | A1 |
20070084911 | Crowell | Apr 2007 | A1 |
20070140678 | Yost et al. | Jun 2007 | A1 |
20070156438 | Popadic et al. | Jul 2007 | A1 |
20070171288 | Inoue et al. | Jul 2007 | A1 |
20070195174 | Oren | Aug 2007 | A1 |
20070206877 | Wu et al. | Sep 2007 | A1 |
20070288382 | Narayanan et al. | Dec 2007 | A1 |
20080031543 | Nakajima et al. | Feb 2008 | A1 |
20080062437 | Rizzo | Mar 2008 | A1 |
20080089573 | Mori et al. | Apr 2008 | A1 |
20080183576 | Kim et al. | Jul 2008 | A1 |
20080231714 | Estevez et al. | Sep 2008 | A1 |
20080247629 | Gilder et al. | Oct 2008 | A1 |
20080267510 | Paul et al. | Oct 2008 | A1 |
20090063431 | Erol et al. | Mar 2009 | A1 |
20090092322 | Erol et al. | Apr 2009 | A1 |
20090141962 | Borgia et al. | Jun 2009 | A1 |
20090185241 | Nepomniachtchi | Jul 2009 | A1 |
20090185736 | Nepomniachtchi | Jul 2009 | A1 |
20090185738 | Nepomniachtchi | Jul 2009 | A1 |
20090201541 | Neogi et al. | Aug 2009 | A1 |
20090261158 | Lawson | Oct 2009 | A1 |
20100073735 | Hunt et al. | Mar 2010 | A1 |
20100074547 | Yu et al. | Mar 2010 | A1 |
20100080471 | Haas et al. | Apr 2010 | A1 |
20100104171 | Faulkner et al. | Apr 2010 | A1 |
20110280450 | Nepomniachtchi et al. | Nov 2011 | A1 |
20120023567 | Hammad | Jan 2012 | A1 |
Number | Date | Country |
---|---|---|
1020040076131 | Aug 2004 | KR |
1020070115834 | Dec 2007 | KR |
2006075967 | Jul 2006 | WO |
2006136958 | Dec 2006 | WO |
Entry |
---|
Stevens. “Advanced Programming in the UNIX Enrivonment.” Addison-Wesley Publishing Company, pp. 195-196 (1992).PTO-892. |
International Search Report and Written Opinion received in PCT/US2011/056593, dated May 30, 2012, 7 pages, IDS. |
Number | Date | Country | |
---|---|---|---|
20210182349 A1 | Jun 2021 | US |
Number | Date | Country | |
---|---|---|---|
61914847 | Dec 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14568085 | Dec 2014 | US |
Child | 17189085 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14042677 | Sep 2013 | US |
Child | 14568085 | US | |
Parent | 14042719 | Sep 2013 | US |
Child | 14042677 | US | |
Parent | 13769833 | Feb 2013 | US |
Child | 14042719 | US |