Having Production Of Printed Copy (e.g., Printer, Typewriter) Patents (Class 380/51)
-
Publication number: 20100106646Abstract: A system and method for data identification, evaluation and control includes pass code and vaulting of consumer information. A non-disclosure process for encrypted records barcode review for underwriters and annual auditors offers unique year end validation for shareholders, regulators, and governmental oversight. The method and system also provides technology useful in fraud detection and asset protection by identifying underwriting patterns through database audit. An embodiment for financial information containing the credit worthiness of a payer on a debt instrument, current valuation of an asset to which the debt instrument is collateralized, and a revalidation of title for the asset as necessary for secondary market financing, trading and asset valuation is disclosed.Type: ApplicationFiled: October 22, 2009Publication date: April 29, 2010Inventors: STACY M. PASSERI, BHARAT C. PORIA
-
Patent number: 7676060Abstract: A method of identifying content in a distributed computing system. The method receives an image or audio signal in a first device in the distributed computing system, such as a cell phone or other wireless device. In this device, the method performs an analysis of characteristics of the signal to identify portions of the signal from which to derive a content identifier. The method then sends the portions to a second, remote device in the distributed computing system, such as a server. The server further processes the portions to derive a content identifier, which in turn, is used to look up data corresponding to the content, such as a Uniform Resource Locator. In the case of a wireless telephone network, for example, the method distributes the task of identifying content signals captured through the microphone or camera on the phones in the network.Type: GrantFiled: June 5, 2007Date of Patent: March 9, 2010Inventors: Trent J. Brundage, Brett T. Hannigan, Ravi K. Sharma
-
Publication number: 20100054467Abstract: An image forming system and a security printing method of the image forming system. The security printing method of the image forming system may include receiving print data in an image forming apparatus, determining whether the received print data includes an authenticated encryption code, and if it is determined that the print data does not include the authenticated encryption code, forming an image to include an image to indicate that the print may not be a print by security print. The security printing method have an advantage of performing a print operation to print data authenticated by a host device with no security application or even in print performance by Direct Printing, with strengthened security.Type: ApplicationFiled: August 20, 2009Publication date: March 4, 2010Applicant: Samsung Electronics Co., Ltd.Inventor: Young-taek CHO
-
Patent number: 7664956Abstract: A method for secure printing is presented. A document management system (DMS) is provided within a server computer for storing, displaying and printing a plurality of documents. At least a portion of the documents require authentication information for displaying and printing. A web-based capture protection system is provided that prevents proprietary content displayed on a display device from being screen-captured. The web-based capture protection system is combined with the DMS to augment the DMS with capture protection of displayed documents, including intercepting retrieval requests from a client computer to display documents from the DMS.Type: GrantFiled: May 7, 2002Date of Patent: February 16, 2010Assignee: Finjan Software, Ltd.Inventor: Daniel I. Goodman
-
Patent number: 7664288Abstract: A method of digital watermarking which can resist against local geometrical distortions such as random bending attack, global geometrical distortions as well as projective transforms, but does not necessary require the recovering of global affine transform or even the repetition of the same watermark pattern. Further, the watermark can resist common global affine transformations such as rotation, scaling, and changes of aspect ratio, cropping as well as other types of operations such as filtering, lossy compression, printing/scanning or detection of watermark in front of video, web or photo camera or any imaging device.Type: GrantFiled: October 2, 2002Date of Patent: February 16, 2010Assignee: Universite de GeneveInventors: Thierry Pun, Slava Voloshynovskiy, Frédéric Deguillaume
-
Publication number: 20100031034Abstract: Provided are a method and apparatus for protecting files to be directly printed. The method includes transmitting an encryption key, when an encrypted file is received, receiving a password of the file encrypted using the encryption key, decrypting the password using a decryption key corresponding to the encryption key, and decrypting the encrypted file using the decrypted password. Accordingly, in performing direct printing, the transmitted file can be protected by encryption. Also, since the password of the file is encrypted and decrypted, the password is not required to be directly input to the printing device and other printing devices can be safely used along with the printing device to which the password is input, thereby increasing convenience for user input.Type: ApplicationFiled: May 13, 2009Publication date: February 4, 2010Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Jin KIM
-
Publication number: 20100023770Abstract: Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job to the printer. The printer decrypts the received print job and prints the document.Type: ApplicationFiled: November 12, 2007Publication date: January 28, 2010Inventors: Mike Partelow, Truxton Fulton, Mehran Faramani
-
Publication number: 20100023769Abstract: Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job to the printer. The printer decrypts the received print job and prints the document.Type: ApplicationFiled: November 12, 2007Publication date: January 28, 2010Inventors: Mike Partelow, Truxton Fulton, Mehran Faramani
-
Patent number: 7653947Abstract: An image forming system which is capable of enhancing security in an i-copy function. A server apparatus stores document data once having been printed in association with a sheet identifier recorded on a print sheet on which the document data has been printed. An image reader section reads the sheet identifier from the print sheet when a copy command is issued by the user authenticated based on an entered user identifier by a CPU of a MFP. A printer section reads out and prints the document data from the server apparatus. When the sheet identifier has not been read from the print sheet based on the copy command over a predetermined time period, the document data is inhibited from being printed by the printer section.Type: GrantFiled: November 22, 2004Date of Patent: January 26, 2010Assignee: Canon Kabushiki KaishaInventor: Manami Hatano
-
Patent number: 7623255Abstract: A printing device can transmit authentication data to a client computer remotely connected to the printing device. The authentication data can be used by the client computer to authenticate itself to a server computer.Type: GrantFiled: October 22, 2004Date of Patent: November 24, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventor: Shell S. Simpson
-
Patent number: 7606388Abstract: A contents border detection apparatus and monitoring method. The apparatus comprises a digital watermark detector for detecting a digital watermark embedded in contents for which a time element is provided; and a border detector for detecting border locations for the contents corresponding to the state of the digital watermark detected by the digital watermark detector. The border detector includes a first border specification device for specifying the border locations for the contents based on information, written in the digital watermark, that is detected by the digital watermark detector and includes a second border specification device for specifying the border locations for the contents based on bit patterns embedded as the digital watermark. The border locations for the contents are detected by using the process result obtained both by the first and the second border specification devices.Type: GrantFiled: May 14, 2002Date of Patent: October 20, 2009Assignee: International Business Machines CorporationInventors: Ryuki Tachibana, Seiji Kobayashi
-
Patent number: 7594115Abstract: A contents information output system which is capable of ensuring security in outputting contents information to a recording medium. A data management apparatus identifies a RF-ID tagged display medium to which contents information is to be outputted, and determines whether or not output of contents information to the identified display medium is permitted. Further, the data management apparatus determines whether or not the contents information designated by a print instruction is registered, and an RF-ID reader-integrated printing apparatus outputs the contents information designated by the print instruction to the display medium, based on the determination by the data management apparatus.Type: GrantFiled: March 26, 2004Date of Patent: September 22, 2009Assignee: Canon Kabushiki KaishaInventor: Sotomitsu Ikeda
-
Patent number: 7590289Abstract: A method, apparatus, and program for image processing are provided to perform operations of generating a verification document image and detecting tampering on the verification document image. The verification document image is generated by a document image generator, which adds a verification pattern to an original document image received from a document provider. A tampering detector determines whether the verification document image has been tampered based on the verification pattern. The output unit prints out, under control of a controller, the verification document image as well as information on whether tampering is detected. The above operations are performed on a network, such as the Internet.Type: GrantFiled: June 14, 2004Date of Patent: September 15, 2009Assignee: Ricoh Company, Ltd.Inventors: Masaki Ishii, Yasushi Abe
-
Patent number: 7565542Abstract: A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data provided on or in a surface associated with the object and is indicative of an identity of the object and at least part of a signature. The signature is in turn a digital signature of at least part of the identity. The computer system uses the indicating to determine a received identity and a received signature part, before using the using the received identity to determine at least a determined signature part. The determined signature part is then compared to the received signature part to authenticate the object.Type: GrantFiled: January 25, 2005Date of Patent: July 21, 2009Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 7564973Abstract: A digital watermark embedding device and method uses block correlation to perform motion detection on temporally sequential digital video signals after performing preprocessing such as division into blocks. The device and method evaluate a plurality of motion information which are calculated for blocks by using a technique such as determination by majority or weighting. Based on the detected motion information, by moving a digital watermark pattern to follow a picture, the digital watermark information can be superimposed on an input digital video signal so as to match human visual characteristics by using a technique such as emphasizing a portion on which the human eye is easily turned.Type: GrantFiled: June 3, 2002Date of Patent: July 21, 2009Assignee: Sony CorporationInventors: Yuuki Matsumura, Osamu Nakamura, Shunichi Soma, Takashi Kohashi
-
Patent number: 7561716Abstract: The invention provides a method and apparatus for watermarking a document, the method comprising: associating the document with an identification number; generating (70) a first set of numbers using a seed for the number generation comprising or derived from the identification number; applying a transform (62) to at least a portion of an image of the document to form a transform of the image; defining a second set of numbers comprising transform coefficients from the transform of the image; forming a modified second set of numbers based on the first set and the second set; substituting the modified second set for the second set in the transform of the image to form a modified transform (72); and applying an inverse (74) of the transform to the modified transform to thereby produce a modified image of the document; whereby the modified image of the document or an output of the modified image constitutes the watermarked document.Type: GrantFiled: April 4, 2003Date of Patent: July 14, 2009Assignee: Datamark Technologies Pte LtdInventors: T. S. Anthony Ho, Jun Shen, K. K. Andrew Chow, W. M. Jeremiah Woon
-
Patent number: 7558962Abstract: A method of using a mobile device to authenticate a print medium online before completing printing onto the print medium, the mobile device including processing means, a printhead, a sensor, a transmitter and a receiver, the print medium comprising a laminar substrate, the method comprising the steps of: using the sensor to sense coded data provided on a surface of the substrate; using the processing means to determine, from the sensed coded data: an identity of the print medium; and at least part of a signature, the signature being a digital signature of at least part of the identity; using the transmitter to send first data to a remote computer system, the first data being indicative of the identity and the at least part of the signature; using the receiver to receive second data from the remote computer system in reply to the first data, the second data being indicative of whether the print medium is authentic based on the identity and the at least part of the signature; and in the event the print medium iType: GrantFiled: May 9, 2005Date of Patent: July 7, 2009Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 7555467Abstract: The present application describes systems and methods for reliable transfer of information of value such as virtual postage stamps between a remote data center and a local device. An identifier that is unique over at least some time duration is assigned to each virtual postage stamp such that the identifier is associated with a specific index memory location or record storage location in the local virtual stamp-printing device. The local printing device permits only a single use of a virtual stamp using a secure state flag. The transfer protocol provides reliable transfer of virtual stamps between the remote data center and the local printing device that accommodates resend requests, that is not limited to serial transfer and that does not require end-to-end acknowledgements.Type: GrantFiled: May 31, 2005Date of Patent: June 30, 2009Assignee: Pitney Bowes Inc.Inventors: Andre Obrea, Frederick W. Ryan, Jr.
-
Patent number: 7552324Abstract: A printer generates a public key with a passphrase containing at least printer position information and a random number by a public key cryptography, and holds this random number. A print client previously acquires the public key from the printer. When transmitting print data to the printer, the print client encrypts the print data in advance with the acquired public key and transmits the encrypted print data as print transmitting data. The printer which has received the print transmitting data generates a private key with a passphrase containing at least printer position information and the held random number by the public key cryptography. The printer then decrypts the received print transmitting data with the private key. Consequently, the security of the print data transmitted from the print client to the printer via a network is ensured.Type: GrantFiled: July 22, 2003Date of Patent: June 23, 2009Assignee: Seiko Epson CorporationInventors: Toshihiro Shima, Kazuhito Gassho, Teruhito Kojima
-
Publication number: 20090129591Abstract: A technique for securing selected document content includes receiving, at a printer, an unsecured electronic document. Selected content of the electronic document is then encrypted, with an encryption key, at the printer. A paper document whose content includes the encrypted selected content of the electronic document is then printed. The encrypted selected content of the paper document is unintelligible prior to decryption with a decryption key.Type: ApplicationFiled: November 21, 2007Publication date: May 21, 2009Inventors: Gregory A. Hayes, David G. Kuehr-McLaren, Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar
-
Patent number: 7532740Abstract: This patent application is generally related to watermarking and steganography. In one implementation, a method of embedding auxiliary information within original data is provided. The original data is divided into a series of groups, with each group in the series of groups associated with a value. The method includes: investigating a first group to determine a presence of a local masking opportunity; and if there exists a presence of a local masking opportunity with the first group, embedding data by setting a value of one or more groups in a neighborhood of the first group, including the first group, in accordance with a value associated with at least a portion of the auxiliary data. Other implementations and embodiments are provided as well.Type: GrantFiled: March 27, 2007Date of Patent: May 12, 2009Assignee: Digimarc CorporationInventor: Kenneth L. Levy
-
Patent number: 7526812Abstract: Documents can be created to include metadata associated with rights management information that applies to the entire document and/or to one or more applicable sub-portions of the document. When a user places such a document to be scanned on a multi-function device (MFD) in a rights management environment, the MFD recognizes metadata associated with user rights management regarding the document and/or applicable sub-portions. The MFD automatically commences a rights management scheme to authenticate the user to a rights management system, query such system for information and permissions related to the document and/or applicable sub-portions, including deciphering the metadata read from the document, and determine if the user-requested function, such as scanning or copying, is permitted to be undertaken on this document and/or applicable sub-portions by this user on this device at this time. The system automatically executes or aborts the user-requested function based on the imposed rights management scheme.Type: GrantFiled: March 24, 2005Date of Patent: April 28, 2009Assignee: Xerox CorporationInventor: Dennis C. DeYoung
-
Patent number: 7526647Abstract: A network publishing authorization protocol, for use in a network connected to a printer, a server and a publisher of network publications. The protocol authorizes the printing of a publication at the printer. It includes the steps of: addressing the publication to a user; signing the publication using a private key; sending the publication to the printer; and confirming that the publication may be printed at the printer, by verifying the private key signature. Confirmation may take place at the printer or at the server.Type: GrantFiled: November 8, 2004Date of Patent: April 28, 2009Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 7519560Abstract: A method of effecting payment. A system for effecting payment. Instructions to send a set of financial instruments to a set of recipients are received at a first system from an agent. A digital signature of the agent is created using a private key associated with the agent is added to the instructions. The agent is associated with a first entity. The instructions are transmitted to a second system. The second system in the instructions are verified using a public key corresponding to a private key associated with the agent. A set of financial instructions is created electronically and digital signatures created using a second private key are added to the financial instruments. The financial instruments from among the set of financial instruments are sent to respective recipients according to the instruments. According to one embodiment of the invention, the financial instruments are encrypted using public keys of respective recipients.Type: GrantFiled: May 24, 2002Date of Patent: April 14, 2009Assignee: JPMorgan Chase Bank, N.A.Inventors: Duc Lam, Matthew Roland, Xuan (Sunny) McRae
-
Patent number: 7508954Abstract: A system and method for recognizing symbols and identifying users or services, including the displaying of an image or video clip on a display device in which identification information is embedded in the image or video clip, the capturing the image or video clip on an imaging device, the transmitting of the image or video clip from the imaging device to a communication network, the transmitting of the image or video clip from the communication network to a processing and authentication server, the processing of the information embedded in the image or video clip by the server to identify logos, alphanumeric characters, or special symbols in the image or video clip, and converting the identified logos or characters or symbols into a digital format to identify the user or location of the user or service provided to the user, and the using of the processed information in digital format to provide one or more of a variety of additional applications.Type: GrantFiled: July 18, 2007Date of Patent: March 24, 2009Assignee: DSPV, Ltd.Inventor: Zvi Haim Lev
-
Patent number: 7508939Abstract: In an image processing system according to the present invention, a first device encrypts image data generated by reading an image in a document, stores a decryption key for decrypting the image data, and transmits the image data to a data storing device. A second device receives the image data from the data storing device, sends a request for the decryption key to the first device and receives the decryption key, decrypts the image data with the decryption key, and performs print processing on the image data. Thus, users can easily perform print processing without the need to remember authentication and printer information.Type: GrantFiled: November 18, 2004Date of Patent: March 24, 2009Assignee: Canon Kabushiki KaishaInventor: Minoru Hashimoto
-
Patent number: 7506159Abstract: A printer generates a public key dependent on printer position information and transmits it to a print client. The print client encrypts a common key with this public key and transmits it to the printer, and encrypts print data with this common key and transmits it to the printer. The printer generates a private key dependent on printer position information to decrypt the encrypted common key, and decrypts the print data with the common key. Consequently, the printer capable of restricting the place where a print operation can be executed can be provided.Type: GrantFiled: October 21, 2004Date of Patent: March 17, 2009Assignee: Seiko Epson CorporationInventors: Toshihiro Shima, Teruhito Kojima
-
Patent number: 7500268Abstract: A method of using a mobile device to authenticate a print medium before completing printing onto the print medium, the mobile device including processing means, a printhead and a sensor, the print medium comprising a substrate, the method comprising the steps of: using the sensor to sense coded data provided on a surface of the substrate; using the processing means to interpret the coded data to authenticate the print medium; and in the event the authentication step is successful, using the printhead to print onto the print medium.Type: GrantFiled: May 9, 2005Date of Patent: March 3, 2009Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 7489797Abstract: A method of fragile watermarking is characterized by the step of generating at least a first ill-conditioned operator, said ill-conditioned operator being related to values extracted from an image or portion thereof A.Type: GrantFiled: June 28, 2004Date of Patent: February 10, 2009Assignee: Motorola, Inc.Inventor: Ebroul Izquierdo
-
Patent number: 7484101Abstract: An object associated with a surface that has coded data disposed thereon or therein. The coded data includes a number of coded data portions, each of which encodes an identity of the object. In addition, each coded data portion encodes at least part of a signature that is a digital signature of at least part of the identity. This allows the coded data to be used to both identify and authenticate the object.Type: GrantFiled: September 28, 2007Date of Patent: January 27, 2009Inventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 7471806Abstract: At every reproduction of a moving image, a tamper resistant module (TRM) randomly selects any one of plural electronic watermark inserting modules, and incorporates the module selected into an area randomly selected from among plural non-operation (NOP) areas in an MPEG expansion module. The module can be switched for each image in a series of the moving images. Since an algorithm for inserting the electronic watermark differs for each moving image or each image, elimination of the electronic watermark by means of analysis, particularly, complete elimination from all the images, is extremely difficult.Type: GrantFiled: January 29, 2004Date of Patent: December 30, 2008Assignee: Fujitsu LimitedInventors: Kiyoshi Kohiyama, Hiroshi Komazaki
-
Patent number: 7472278Abstract: A method of authenticating an object in which a computer system receives indicating data from a sensing device. The indicating data is generated in response to sensing of coded data and is indicative of an identity of the object and a plurality of signature fragments, the signature being a digital signature of at least part of the identity. The computer system uses the indicating data to determine the identity and the plurality of signature fragments. The plurality of signature fragments are then used to determined a determined signature, which is in turn used to generate a generated identity. The identity is then compared to the generated identity to authenticate the object.Type: GrantFiled: September 28, 2007Date of Patent: December 30, 2008Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 7467299Abstract: A sensing device for authenticating an object. The device includes a sensor for sensing coded data provided on or in a surface associated with the object. The coded data encodes an identity and, at least one part of a signature, the signature being a digital signature of at least part of the identity. The sensed coded data is then used by a processor, to determine a sensed identity and at least one sensed signature part, which are then in turn used to authenticate the object. The processor may form part of the sensing device, or be connected to the sensing device via a communications system.Type: GrantFiled: January 25, 2005Date of Patent: December 16, 2008Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 7467300Abstract: Coded data for disposal on or in a surface that includes a number of coded data portions. Each coded data portion encodes an identity of an object or the like associated with the surface. In addition, each coded data portion encodes at least part of a data object so that the data object is encoded in its entirety over a number of data portions, thereby allowing the data object to be reconstructed. The data object can include digital data relating to the object, such as product information, or a digital signature of at least part of the identity.Type: GrantFiled: January 25, 2005Date of Patent: December 16, 2008Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 7467301Abstract: A method of authenticating an object using a processor that receives indicating data generated in response to sensing of coded data. The indicating data is indicative of an identity of the object and, at least part of a signature, the signature being a digital signature of at least a part of the identity. The processor determines from the indicating data, a received identity and at least one received signature part, and then uses the received identity and a secret key, to determine a determined signature. The determined signature is then compared to the at least one received signature part to authenticate the object.Type: GrantFiled: September 28, 2007Date of Patent: December 16, 2008Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 7457961Abstract: A method of authenticating an object, the method including: sensing coded data provided on or in a surface associated with the object; determining, from the sensed coded data: an identity of the object; a plurality of signature fragments, the signature being a digital signature of at least part of the identity; determining, using the plurality of signature fragments, a determined signature; generating, using the determined signature and a key, a generated identity; comparing the identity to the generated identity; and, authenticating the object using the results of the comparison.Type: GrantFiled: January 25, 2005Date of Patent: November 25, 2008Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 7447908Abstract: A method of using a mobile device to authenticate a print medium offline before completing printing onto the print medium, the mobile device including processing means, a printhead and a sensor, the print medium comprising a laminar substrate, the method comprising the steps of: using the sensor to sense coded data provided on a surface of the substrate; using the processing means: determining, from the sensed coded data: an identity of the print medium; and at least part of a signature, the signature being a digital signature of at least part of the identity; determining, using the at least part of the signature, a determined signature; generating, using the determined signature and a public key stored in the mobile device, a generated identity; comparing the identity to the generated identity; and authenticating the print medium using the results of the comparison; and in the event the authentication step is successful, using the printhead to print onto the print medium.Type: GrantFiled: May 9, 2005Date of Patent: November 4, 2008Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Publication number: 20080260144Abstract: An image forming apparatus is supplied capable of preventing data stored in a non-volatility memory from being read out when the non-volatility memory is stolen. In the image forming apparatus, an encryption function section of encryption/decryption function section encrypts print job received from an information processing apparatus or print data made in the image forming apparatus, and stores it to a non-volatility memory; and a decryption function section of the encryption/decryption function section decrypts the print job or the print data encrypted by the encryption function section and stored in the non-volatility memory, and outputs it.Type: ApplicationFiled: April 17, 2008Publication date: October 23, 2008Applicant: OKI DATA CORPORATIONInventor: Hisashi Ozawa
-
Patent number: 7436956Abstract: Encryption of documents is used to restrict access to such documents to those users who have the appropriate decryption keys. The encryption of documents on public web servers hitherto has prevented indexing by search engines. By keeping words and possible sentences or paragraphs intact in the encrypted document but re-ordering elements of the document to prevent the document being human-readable, the possibility of encrypted documents being indexed by search engines is provided.Type: GrantFiled: June 21, 2002Date of Patent: October 14, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventor: David Murray Banks
-
Patent number: 7430762Abstract: Identification card manufacturing security restricts use of an identification card manufacturing system with only authorized supplies. In accordance with one aspect of the invention, a supply-specific security code (SSSC) and supply-specific data are stored in memory of the supply. The SSSC is translated using the supply-specific data. Finally, the supply is authorized for use with the identification card manufacturing system only when the translated SSSC is found to be valid. In accordance with another aspect of the invention, an identification card manufacturing system is configured to operate only with supplies having corresponding customer-specific security codes (CSSC). A supply CSSC and supply-specific data are retrieved from memory of the supply. Additionally, a system CSSC and system-specific data are retrieved from memory of the identification card manufacturing system. The supply CSSC and the system CSSC are translated using the supply-specific data and the system-specific data, respectively.Type: GrantFiled: February 21, 2003Date of Patent: September 30, 2008Assignee: Fargo Electronics, Inc.Inventors: Gary M. Klinefelter, Thomas C. Platner, Joseph F. Schuler, Leon Gershenovich, David W. Kaiser, Gary R. Holland
-
Publication number: 20080199008Abstract: An image forming device, to which an external storage is detachably connected, is provided with a first password acquiring unit configured to acquire a password input by a user when print data is to be encrypted, and an encrypting unit configured to encrypt the print data in accordance with the password acquired by the first password acquiring unit and store the encrypted print data in the external storage. The image forming device is further provided with a second password acquiring unit configured to acquire a password input by the user when the encrypted print data is to be printed, a decrypting unit configured to decrypt the encrypted print data in accordance with the password acquired by the second password acquiring unit, and a printing unit configured to print the print data which is encrypted by the encrypting unit and then decrypted by the decrypting unit.Type: ApplicationFiled: February 21, 2008Publication date: August 21, 2008Inventor: Hiroshi Hattori
-
Patent number: 7398545Abstract: A user data management device, a storage medium which stores a control program, and a control method are disclosed which efficiently report the identity of a user who is using equipment to some or all members of the department in which that equipment is located, or to managers of that department, in order to be informed of the use status of that equipment, and control the use of that equipment by unauthorized users. The user data management device includes input means that inputs user data belonging to a user that will use the equipment, notification means that will provide one or more persons with identity data concerning a user who is using the equipment in which the user data was input, authentication means that authenticates the user from the user data, and notification determination means that will determine one or more persons to be provided with identity data, and then provide identity data to them that identifies the user authenticated with the authentication means by means of the notification means.Type: GrantFiled: June 3, 2005Date of Patent: July 8, 2008Assignee: Kyocera Mita CorporationInventor: Yoshitaka Matsuki
-
Publication number: 20080159530Abstract: The invention introduces a stand-alone small electronic device that provides the means for computer users to encrypt and keep their everyday confidential account login information in an indexed notebook or stored in a removable memory module for easy reference. Such account information includes User-Names, passwords, secret questions, and secret answers to those questions. This eliminates the risk of confidential account information exposure, should the storage media gets lost, stolen, or misplaced. Account login information are entered as separate character-strings into the device and are encrypted by using software that makes use of a “Master Password” phrase/character-string as an “Encryption-Decryption-Key”. The Master Password is a phrase or a combination of words, characters, and numbers a user can easily remember. Unlike a personal computer that is attached to networks, the stand-alone device is not connected to a network or the internet in a way to jeopardize user account information confidentiality.Type: ApplicationFiled: November 20, 2006Publication date: July 3, 2008Inventor: Mehran Randall Rasti
-
Publication number: 20080130882Abstract: A printing system adapted for use in a computing infrastructure includes a printer for printing documents; a radiofrequency identification (RFID) reader for communicating with at least one RFID tag and the computing infrastructure; a plurality of RFID tags for authenticating a user; a link for providing communication between an RFID tag and the reader and providing authentication of an RFID tag; and a controller for initiating printing of a document upon the authentication. A method for printing a document includes recognizing a radiofrequency (RFID) tag within a certain proximity of a printer; associating the RFID tag with a document stored in a queue; and printing the document while the RFID tag remains within the certain proximity. A computer program product is provided.Type: ApplicationFiled: December 5, 2006Publication date: June 5, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ross E. Hagglund, Cuong M. Le
-
Publication number: 20080130896Abstract: A method and system is provided for increasing the accuracy and security of data capture from a paper form where the form was completed electronically and printed out prior to submission. The invention utilizes two-dimensional barcode technology to dynamically capture data entered electronically into the form. The data contained in this two-dimensional barcode is then encrypted for security and authentication purposes and printed on the form when the user prints the form.Type: ApplicationFiled: November 14, 2007Publication date: June 5, 2008Inventors: Paul Gerrard Wernet, Dean Joseph Whitmore
-
Patent number: 7383441Abstract: The invention relates to a method for confirming the authenticity of a document. According to the invention, said method is carried out in such a way that the authenticity is confirmed using a digital signature, the signed confirmation of authenticity is integrated into the document by means of a secret watermark and that the document is also provided with a public watermark.Type: GrantFiled: July 18, 2002Date of Patent: June 3, 2008Assignee: Thomson LicensingInventors: Jan C. Vorbrüggen, Wolfgang Kubbilun, Eckhard Koch, Ingo A. Kubbilun, Hans Joachim Bickenbach, Marcus Belke
-
Publication number: 20080101601Abstract: A method for preparing and verifying a document, comprising the steps of: presenting the document to a document-registering office in a machine-readable format; editing the document to add an identification code associated with a non-copiable object; signing the edited document using a private key of the document-registering office; printing the digitally signed document in a machine-readable form; presenting the document and the object to an inspecting authority; recovering the digitally signed document from the machine-readable form of the printed document; verifying the digital signature of the document-registering office; and verifying that the identification code in the document corresponds to that of the presented object.Type: ApplicationFiled: October 1, 2007Publication date: May 1, 2008Inventors: Srinivasan Ramani, Darpan Goel, Anil Kumar
-
Patent number: 7366301Abstract: A multiple-layered watermark is generated to be placed on document, to protect against counterfeiting and forgery. Hidden information embedded into each of the watermark's layers is only detectable by using a corresponding decoder. Because of the multiple-layered structure, it is difficult to reverse engineer the optical watermark. The generalized watermark structure significantly increases the “key space” of the decoder.Type: GrantFiled: March 16, 2001Date of Patent: April 29, 2008Assignee: Trustcopy Pte Ltd.Inventors: Sheng Huang, Jian Kang Wu
-
Patent number: 7353398Abstract: The invention described herein utilizes a universally known and accepted unique item that is independently identifiable and valuable so as to be constituted for difficulty of counterfeiting as an authenticator item. The identity of this item is included in an authorization calculation which can only be accomplished by an authorizing issuing authority. In a preferred embodiment of the invention, the authenticator is a serial numbered item such as a currency bill or note. The document may be created in a decentralized fashion using ordinary plain paper and the document may even take electronic or other forms. The issuing authority must have the critical or important details of the document and must authorize the creation of the document before it can be created. Further the document's authenticity may be verified without communication back to the issuing authority.Type: GrantFiled: May 29, 2002Date of Patent: April 1, 2008Assignee: International Business Machines CorporationInventor: David Alan Kra
-
Patent number: 7346586Abstract: This invention concerns a validation protocol for determining whether an untrusted authentication chip is valid, or not. The protocol may be used to determine the physical presence of a valid authentication chip and from that determine whether a consumable containing the chip is valid. In another aspect the invention also concerns a system for validating the chip. A random number is generated and encrypted with an asymmetric encryption function. It is then passed to an untrusted authentication chip where it is decrypted. The decrypted random number is then compared with the original random number, and in the event of a match the untrusted chip is considered to be valid.Type: GrantFiled: March 2, 2000Date of Patent: March 18, 2008Assignee: Silverbrook Research Pty LtdInventor: Simon Robert Walmsley