Abstract: Methods, computer readable media, and apparatuses for preventing unauthorized font linking are presented. A request for a font file may be received. It may be determined whether the request is valid, and this determination may be based on a security token and/or a referrer string. If the request is determined to be valid, a first watermark may be embedded in the font file, and the first watermark may be based on the security token. The first watermark may include at least one point in at least one glyph contained in the font file. A second watermark may be embedded in the font file, and the second watermark may include at least one table that identifies a customer. The font file then may be served to the requestor.
Abstract: An method for using a floating pallet for a digital asset management system in a plurality of different applications is disclosed. A single extension plug-in is created to interface with API's of all of the plurality of different applications, wherein the extension plug-in communicates with the digital asset management system. The floating pallet for said digital asset management system is created in one of the plurality of different applications wherein the floating pallet uses the properties and behaviors of a selected application. An indication that a file has been transferred from said digital asset management system to said selected application is then given.
Abstract: An apparatus for using a floating pallet for a digital asset management system in a plurality of different applications is disclosed. A single extension plug-in is created to interface with API's of all the plurality of different applications, wherein the extension plug-in communicates with the digital asset management system. The floating pallet for the digital asset management system is created in one of the plurality of different application wherein the floating pallet uses the properties and behaviors of a selected application. An indication that a file has been transferred from the digital asset management system to the selected application is then given.
Abstract: A method for examining font files for corruption involves an font manager communicating with a remote font server which stores uncorrupted font files. A portion of the font file to be checked for corruption may be compared with the uncorrupted font file to determine whether the file is corrupted. If the file is corrupted, an uncorrupted font file may be downloaded to the font manager to replace a portion of the corrupted font file containing the actual font file as opposed to a portion of the font file which may include other information such as kerning information.
Abstract: A preflight system has a printer profile database containing a list of problem document elements and a list of universal resource locator addresses. Each of the universal resource locator addresses is associated with at least one of the problem document elements. The preflight system also has an analyzer that compares document elements from a print file submitted by a print buyer with the problem document elements, in order to identify those document elements occurring in the print file that may cause a problem during printing. The analyzer then compiles a list of the universal resource locator addresses associated with problem document elements found in the print file.
Type:
Grant
Filed:
July 26, 2000
Date of Patent:
August 19, 2003
Assignee:
Extensis, Inc.
Inventors:
Joseph Schorr, Tara E. Starr, Raymond J. Marshall, Todd Whitaker, Blake L. Sliter