Skip to main content

Docket Analyzer OCR Utility

Project description

Docket Analyzer OCR

Installation

pip install 'docketanalyzer[ocr]'

Local Usage

Process a document:

from docketanalyzer.ocr import pdf_document

path = 'path/to/doc.pdf
doc = pdf_document(path) # the input can also be raw bytes
doc.process()

for page in doc:
    for block in page:
        for line in block:
            pass

You can also stream pages as they are processed:

doc = pdf_document(path)

for page in doc.stream():
    print(page.text)

Pages, blocks, and lines have common attributes:

# where item is a page, block, or line

item.data # A dictionary representation of the item and it's children
item.text # The item's text content
item.page_num # The page the item appears on
item.i # The item-level index
item.id # A unique id constructed from the item and it's parents index (e.g. 3-2-1 for the first line in the second block on the third page).
item.bbox # Bounding box (blocks and lines only)
item.clip() # Extract element as an image from the original pdf

Blocks also have a block type attribute:

print(block.block_type) # 'title', 'text', 'figure', etc.

Save and load data:

# Saving a document
doc.save('doc.json')

# Loading a document
doc = pdf_document(path, load='doc.json')

Remote Usage

You can also serve this tool with Docker.

docker pull nadahlberg/docketanalyzer-ocr:latest
docker run --gpus all -p 8000:8000 nadahlberg/docketanalyzer-ocr:latest

And then use process the document in remote mode:

doc = pdf_document(path, remote=True) # pass endpoint_url if not using localhost

for page in doc.stream():
    print(page.text)

S3 Support

When using the remote service, if you want to avoid sending the file in a POST request, configure your S3 credentials. Your document will be temporarily pushed to your bucket to be retrieved by the service.

To configure your S3 credentials run:

da configure s3

Or set the following in your env:

AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_S3_BUCKET_NAME
AWS_S3_ENDPOINT_URL

Usage is identical. We default to using S3 if credentials are available. You can control this explicitly by passing use_s3=False to pdf_document.

Serverless Support

For serverless usage you can deploy this to RunPod. To get set up:

  1. Create a serverless worker on RunPod using the docker container.
nadahlberg/docketanalyzer-ocr:latest
  1. Add the following custom run command.
python -u handler.py
  1. Add your S3 credentials to the RunPod worker.
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_S3_BUCKET_NAME
AWS_S3_ENDPOINT_URL
  1. On your local machine, configure your RunPod key and the worker id.

You can run:

da configure runpod

Or set the following in your env:

RUNPOD_API_KEY
RUNPOD_OCR_ENDPOINT_ID

Usage is otherwise identical, just use remote=True with pdf_document

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

docketanalyzer_ocr-0.1.2.tar.gz (36.9 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

docketanalyzer_ocr-0.1.2-py3-none-any.whl (36.6 MB view details)

Uploaded Python 3

File details

Details for the file docketanalyzer_ocr-0.1.2.tar.gz.

File metadata

  • Download URL: docketanalyzer_ocr-0.1.2.tar.gz
  • Upload date:
  • Size: 36.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.11

File hashes

Hashes for docketanalyzer_ocr-0.1.2.tar.gz
Algorithm Hash digest
SHA256 a52b31c3ce02b54d1f8c9416d75d5a16f1af990fba8d463ba37b6579d3a5a777
MD5 21289aba27bd67123e0173edd2c21bc6
BLAKE2b-256 094df41aa517fc7b3c8ffdf4a1a57cd72c9b81075a0fac358173676c45d4fb2a

See more details on using hashes here.

File details

Details for the file docketanalyzer_ocr-0.1.2-py3-none-any.whl.

File metadata

File hashes

Hashes for docketanalyzer_ocr-0.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 4aa4ed6db0c18a5f77865f3e5bd91d5f28b343a100b20046a6e5e97fbff50f3e
MD5 fa78813d4b4d4842bec835394377136a
BLAKE2b-256 2073085706fcaa0866c999399371b7e8182283ecedb54e85805ba81dbf229a03

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page