Abstract:
Techniques described herein are directed to a system and methods for generating 3D models of an object which accurately depict reflective properties of the object. To do this, an image of an object is captured and a rendered image of the object is generated from the image. The system then generates a lighting effect which approximates an effect of the actual light source on the appearance of the object when the image was captured. A number of rendered images of the object are generated using the lighting effect, each having different visual material property values. Once the rendered images have been generated, the system may compare the generated rendered images to the actual image in order to identify the rendered image which best approximates the actual image. The visual material property values associated with the best approximation are then assigned to the object.
Abstract:
The present invention provides a system that facilitates the selection of purchasable items for use in an environs defined by the customer. In one aspect, the system includes a processing element capable of proposing a plurality of purchasable items to the customer for selection by the customer. The processing element also is capable of receiving data representing the environs and data representing at least one purchasable item selected by the customer. The processing element is further capable of generating and displaying a three-dimensional graphical representation of the environs and each purchasable item or items selected by the customer so that the customer can visualize the items in the environs.
Abstract:
A bracket (12) for attachment to a support (16) for mounting a fixture (14), and method for installing the same are provided. The bracket (12) includes a base (18) having first and second sides (18a/b). The bracket (12) also includes first and second flanges (20a/b) extending from the first side of the base (18a), the first and second flanges (20a/b) defining an elongate aperture (40) therebetween. The elongate aperture (40) further extends from the first side of the base (18a) towards the second side of the base (18b). The elongate aperture (40) is adapted to movably receive one end of the fixture (14) so that the fixture (14) may be mounted to, and demounted from, the bracket (12) by sliding the end of the fixture (14) at least partially along the length of the elongate aperture (40) and wherein the first and second flanges (20a/b) are structured to contact the support (16) to provide lateral support to the base (18) and the fixture (14).
Abstract:
Methods, systems, and apparatuses for configuring a device for a specific task or set of tasks thereby allowing the device to be used for more than one task or set of tasks while also enabling fine-grain control over how the device may be used. A device's file system can operate with a particular file system based on the task(s) that the device will perform. Further, the device can physically configure itself based on the task(s) that the device will perform.
Abstract:
Techniques described herein include receiving a first signal indicating that a location of a first electronic device has changed. The first electronic device can have a functionality and be in an unlocked state that permits use of at least one aspect of the functionality. The techniques further include storing, based on the first signal, an indication that the first electronic device is to be put into a locked state that prevents use of the at least one aspect of the functionality. The techniques further include causing, based on a second signal indicating the first electronic device is in a proximity to a boundary, at least one of: sending a command to put the first electronic device into the locked state, or foregoing the sending of the command based on a transaction that relates to the first electronic device.
Abstract:
Techniques are described herein for a secure access to an online service based on a token exchange. In an example, a first user interface associated with a first user account is presented on a first user device and is used to indicate a set of restrictions associated with use of a function of the online service by the first user account. A security credential can be generated and associated with the set of restrictions. Upon receiving the security credential from a second user device from which a login to the first user account has not occurred, a determination can be made that the function is accessible to the second user device. This access can use the first user account subject to the restrictions. A token associated with the set of restrictions and the function can be sent to the second user device to enable the use of the function.
Abstract:
A modeling system stores a three-dimensional (3D) virtual object that corresponds to a real-world object, the 3D virtual object including a superimposition of an image area showing a portion of the real-world object on a face of a 3D shape. The modeling system stores a virtual reset that includes information about the 3D virtual object and a position of the 3D virtual object in the virtual reset. The modeling system presents the virtual reset, the presentation showing the 3D virtual object at the position.
Abstract:
Methods, systems, and apparatuses for configuring a device for a specific task or set of tasks thereby allowing the device to be used for more than one task or set of tasks while also enabling fine-grain control over how the device may be used. A device's file system can operate with a particular file system based on the task(s) that the device will perform. Further, the device can physically configure itself based on the task(s) that the device will perform.
Abstract:
Described herein are a system and methods for efficiently using depth and image information for a space to generate a 3D representation of that space. In some embodiments, an indication of one or more points is received with respect to image information, which is then mapped to corresponding points within depth information. A boundary may then be calculated to be associated with each of the points based on the depth information at, and surrounding, each point. Each of the boundaries are extended outward until junctions are identified as bounding the boundaries in a direction. The system may determine whether the process is complete or not based on whether any of the calculated boundaries are currently unlimited in extent in any direction. Once the system determines that each of the boundaries is limited in extent, a 3D representation of the space may be generated based on the identified junctions and/or boundaries.
Abstract:
Techniques described herein are directed to a system and methods for enabling a transfer of access rights for an electronic device between users. In embodiments of the system, a first user (e.g., a transferor) may, upon determining that access rights should be granted to a second user (e.g., a transferee), generate a transaction record. The transaction record may then be provided to a registry network, which may verify a digital signature of the transaction record as well as a current ownership status. Upon verification, the transaction record may be written to an ownership registry and a mobile application server may be notified of the transaction. Once notified, the mobile application server may transmit a device key to a user device associated with the transferee. Once the device key has been received at the transferee user device, it may be used to issue commands to the electronic device.