Having Production Of Printed Copy (e.g., Printer, Typewriter) Patents (Class 380/51)
-
Patent number: 6978019Abstract: A method and system for registration of a user to use a particular terminal of a computer system. The method includes providing a printed registration form including registration information and coded data thereon, the coded data including an indication of an identity of the form and at least one reference point on the form. The method also includes receiving in the computer system, through said terminal, indicating data from a sensing device, the indicating data including information regarding an identity of the sensing device, the identity of the form and at least one action of the sensing device in relation to the form generated by the sensing device using at least some of the coded data. The method further includes determining, from the indicating data and stored user registration data in the computer system, an identity of a registered user of the computer system; and storing, in the computer system, registration data associating the identity of the registered user with said computer system terminal.Type: GrantFiled: June 30, 2000Date of Patent: December 20, 2005Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 6971007Abstract: The transmission and reproduction of an original document transferred via a data network can be assured when the printing mechanism generates a unique serial number for the document being printed. The sender of the document is assured that the intended recipient received the document, paid for it, and was able to print it by receipt of the unique serial number and a request for an encryption key by which certain information in the document was encrypted.Type: GrantFiled: August 17, 2000Date of Patent: November 29, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventor: Kevin G. Currans
-
Patent number: 6970843Abstract: A financial transaction network includes a customer network serviced by a host processor. The financial transaction network provides customers with a plurality of diverse and interchangeable financial products and financial services that customers may utilize to directly manage their financial assets. The host processor acts as a communications switch validating incoming transaction requests and routing them to specialized subsystems. The host processor maintains central records that can be accessed by network participants. The financial transaction network enables customers to continually interchange account values relating to any financial product, or financial service within the network. With its accessibility, speed and finality of settlement, the network permits these interchanges to be accomplished with maximum efficiency.Type: GrantFiled: August 24, 2000Date of Patent: November 29, 2005Inventor: Patrick A. Forte
-
Patent number: 6959101Abstract: A method and apparatus for embedding information into a target element in which information is to be embedded and a storage medium. The method and apparatus include obtaining plural sets of data values of a plurality of elements, wherein each set of data values is obtained along one direction extending through the target element, determining a strength of embedding information into the target element based on the plural sets of data values obtained, and embedding information into the target element based on the strength determined. The storage medium stores a program which enables embedding information by execution by a computer.Type: GrantFiled: December 12, 2003Date of Patent: October 25, 2005Assignee: Hitachi, Ltd.Inventors: Hiroshi Yoshiura, Kousuke Anzai, Yutaka Kurosu
-
Patent number: 6941461Abstract: A system and method for unique authentication of each replication of a plurality of soft-copy documents, forming a group. One soft-copy document, out of the group, becomes a carrier for an authentication code aimed at protecting the group. The authentication code is computed from the concatenation of the plurality of soft-copy documents and a key. A random number is also generated for each replication of the group of files. The random number is combined with the authentication code to mark the soft-copy document which has been selected to become the carrier. Thus, the invention introduces randomization in the insertion of the authentication code so that for each replication of an identical group of data files, unique authentication data can be associated, merged and hidden in the transmitted information.Type: GrantFiled: May 9, 2001Date of Patent: September 6, 2005Assignee: International Business Machines CorporationInventors: Fernando Incertis Carro, Stephen Matyas
-
Patent number: 6925498Abstract: When printing output data that become output objects, copyright data attached to the corresponding said output data or information on copyright managed by a copyright managing device are selectively used to execute a print processing of said output data. This allows the output process to be executed based on the copyright information best suited for the corresponding output data.Type: GrantFiled: April 10, 2001Date of Patent: August 2, 2005Assignee: Canon Kabushiki KaishaInventor: Yasuhiro Kujirai
-
Patent number: 6909783Abstract: Computer methods, systems, and devices, providing automatic permutations of a programmed modified random symbol square matrix producing one time pad messages are disclosed enabling messages to be encrypted from plain text which is typed into a computer thereby selecting random symbols from the matrix. Typing in text in a continuous stream yields a continuous stream of enciphered symbols. The input into a computer via an input device activates a computer program driven device called a sliding scale whose function is to select random symbols from the matrix. The sliding scale responds to the program containing the applicable algorithms for encryption and decryption. Initiating input into the computer requires the selection of an entry point to activate the algorithms given in the Appendix herein. In the 96×96 Square described, there are 9216 entry points yielding many individual alphabets from which to select random symbols.Type: GrantFiled: July 24, 2003Date of Patent: June 21, 2005Inventors: Joseph Samuel Incarnato, William Martin Auslander
-
Patent number: 6876460Abstract: There is disclosed an image processing apparatus for solving a problem that much time is required for judging specific information when the specific information such as a digital watermark is judged and printing is controlled, the apparatus comprising: indication means for indicating a mode from a first printing mode and a second printing mode higher in speed than the first printing mode; judgment means for judging whether or not specific information exists in an original; and printing means for, when the indication means indicates the second printing mode, printing an image in accordance with the original without performing the judgment by the judgment means.Type: GrantFiled: January 29, 2001Date of Patent: April 5, 2005Assignee: Canon Kabushiki KaishaInventor: Makoto Torigoe
-
Patent number: 6865557Abstract: A transaction evidencing system includes a plurality of computer systems operatively configured to form a network with one of the computer systems functioning as a server and the remaining computer systems functioning as clients. Each of the computer systems includes a processor, memory and storage media. At least some of the storage means includes non-metering application programs that are selectively run on the client computer systems. An unsecured printer is operatively coupled to at least one of the computer systems for printing in accordance with the non-metering application programs. A portable vault card, which is removably coupled to the server computer system, includes digital token generation and transaction accounting processing. The client computer systems issue requests for digital tokens to the server computer system in response to requests for indicia from the non-metering application programs.Type: GrantFiled: December 1, 1999Date of Patent: March 8, 2005Assignee: Pitney Bowes Inc.Inventors: Robert A Cordery, David K. Lee, Steven J. Pauly, Leon A Pintsov, David W. Riley, Frederick W. Ryan, Jr., Monroe A Weiant, Jr.
-
Patent number: 6862583Abstract: Authorized printout of an image corresponding to print data received at a print node from a network. The authorized printout comprises encrypting print data by a print node and storing the encrypted print data without printout, receiving authentication of an intended recipient to print the print data, and decrypting the encrypted print data by the print node and printing the decrypted print data by an image forming device, responsive to receipt of authentication in the receiving step. The print node may be the image forming device itself or a gateway to multiple image forming devices. The print node encrypts the print data with either a symmetric key or an asymmetric key.Type: GrantFiled: October 4, 1999Date of Patent: March 1, 2005Assignee: Canon Kabushiki KaishaInventors: Craig Mazzagatte, Royce E. Slick, Neil Iwamoto
-
Patent number: 6859534Abstract: This invention relates generally to a method and apparatus, as implemented by a software program on a computer system, for digitally producing counterfeit-deterring scrambled or coded indicia images, typically in a printed form. This method and system are capable of combining a source image with a latent image so the scrambled latent image is visible only when viewed through a special decoder lens. The digital processing allows different latent images to be encoded according to different parameters. Additionally, latent images might be encoded into single component colors of an original visible image, at various angles from each other. A second embodiment teaches a method of forming an optical surface having diffraction properties that vary over the optical surface in accordance with a security graphic image that includes an encoded recognizable indicium formed as a parallax panoramagram image through a lenticular line screen.Type: GrantFiled: January 12, 1998Date of Patent: February 22, 2005Inventor: Alfred Alasia
-
Patent number: 6847952Abstract: A postage metering system includes a base and a user interface mounted to the base. The user interface includes a micro controller, an internal socket for receiving an integrated circuit chip and a smart card reader interface connector for interfacing with an external smart card. The micro controller is configurable to address either the internal socket or the smart card reader interface connector to access postage metering functionality.Type: GrantFiled: November 4, 2002Date of Patent: January 25, 2005Assignee: Pitney Bowes Inc.Inventors: David W. Beckstrom, Donald T. Dolan, Joan T. Doutney, Yakup J. Igval, Sungwon R. Moh, Christina S. Park, Roger J. Ratzenberger, Jr., Richard P. Schoonmaker, James R. West
-
Patent number: 6842742Abstract: An improved system for providing early warning preemptive postal equipment replacement. Selected performance parameters the postal equipment are monitored and compared against predetermined operational boundaries. The system is capable of providing for variability in the performance parameters, wherein these parameters may be permitted to vary over time and usage of the equipment. The monitoring gives an indication of the overall system performance. If the system performance goes outside of operational boundaries, or changes significantly over time, replacement of the equipment can then be scheduled with minimal inconvenience to the customer.Type: GrantFiled: July 31, 2000Date of Patent: January 11, 2005Assignee: Ascom Hasler Mailing Systems, Inc.Inventor: George Brookner
-
Patent number: 6804784Abstract: A file system security driver and vault method and system particularly applicable to a system in which protected data is segregated from other data, which allows for back-channeling of file data in order to ensure that files created by applications using secured data do not cause data leaks of secure data. In a preferred embodiment, a file system security driver is a driver resident on the kernel level which monitors file system requests and allows limited access to files resident on the vault and creation of files within the vault when necessary.Type: GrantFiled: November 22, 2000Date of Patent: October 12, 2004Assignee: Infraworks CorporationInventors: George Friedman, Robert Phillip Starek, Carlos A. Murdock
-
Patent number: 6801999Abstract: A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (400). Specifically, a relatively large number, n, of identical watermarks (1720) are embedded throughout a software object (1700), through use of n different secret watermark keys to form a protected object, with each key defining a pointer to a location in the protected object at which a corresponding watermark appears. Once a user has downloaded a protected object through a client computer, the user transacts with a publisher's web server (335) to obtain an electronic license, cryptographically signed by the publisher to an enforcer (600, 600′) located in that client computer, which specifies rights, which the publisher accords, for accessing and using this object, to this computer and an “expected” value of a parameter contained in the watermarks.Type: GrantFiled: May 20, 1999Date of Patent: October 5, 2004Assignee: Microsoft CorporationInventors: Ramarathnam Venkatesan, Yacov Yacobi
-
Patent number: 6792110Abstract: The invention relates to an apparatus and method for enhancing the security of selected information associated with a negotiable document, such as the monetary value of a cheque. In the invention, one or more security features are printed or applied onto the cheque. One such security feature is an encrypted control code. The preferred embodiment employs a secret key cryptographic scheme to encrypt the monetary value and thereby generate a first control code which is printed on the check. When the check is presented for payment, a validator, such as bank or cheque clearing house, employs a verification system having a copy of the encryption key to read the monetary value from the cheque and re-encrypt it according to said scheme to generate a second control code. The cheque is not honored if the first and second control codes are not identical. Another security feature is a security image, composed, for instance, from a foreground image of the monetary value superimposed over a background motif image.Type: GrantFiled: July 1, 2002Date of Patent: September 14, 2004Inventor: Calin A. Sandru
-
Patent number: 6766056Abstract: Disclosed is method of detecting a predetermined mark (30) forming part of an image. A digitized form (48, 49) of the image (21) comprising a plurality of picture elements is provided and within a current region of the image a set of features is determined. The features typically comprise a dominant color feature (44) within the current region; and at least one moment feature (111) based on picture elements pertaining to the predetermined mark within the current region. Each determined feature is compared (113) with a corresponding predetermined feature (114) of the predetermined mark. Using the comparison, a confidence level for a detection of said predetermined mark within the current region calculated. Based on the confidence level, whether or not said predetermined mark is detected in the current region can then be determined.Type: GrantFiled: November 30, 1999Date of Patent: July 20, 2004Assignee: Canon Kabushiki KaishaInventors: Kai Huang, Yu-Ling Chen, Peter Leslie Bell, Michael John Webb, Yoong-Chert Foo
-
Patent number: 6735310Abstract: A technique for password encryption and decryption for user authentication in a federated content management system. One or more commands are executed in a computer to perform a datastore operation on a datastore connected to the computer. A string of characters are received. The string of characters is encrypted based on a first character standard. Then, the encrypted string of characters is transformed to be compatible with a second character standard.Type: GrantFiled: September 17, 1999Date of Patent: May 11, 2004Assignee: International Business Machines CorporationInventors: Michael Chi-Pei Hsing, Alan Tsu-I Yaung
-
Publication number: 20040080777Abstract: A document security system for securely printing documents that are uniquely marked on each page of ordinary or specialized paper with a security mark such that copying and or alteration is prevented, the security mark comprising information relating to the document and further being unique to each page having specific information relating to each page of the document.Type: ApplicationFiled: August 6, 2003Publication date: April 29, 2004Inventor: Wendell M. Smith
-
Patent number: 6728882Abstract: Disclosed is an optical disk barcode forming method wherein, as information to be barcoded, position information for piracy prevention, which is a form of ID, is coded as a barcode and is recorded by laser trimming on a reflective film in a PCA area of an optical disk. When playing back the thus manufactured optical disk on a reproduction apparatus, the barcode data can be played back using the same optical pickup.Type: GrantFiled: February 20, 2002Date of Patent: April 27, 2004Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Yoshiho Gotoh, Mitsuaki Oshima, Shinichi Tanaka, Kenji Koishi, Mitsuro Moriya
-
Patent number: 6724914Abstract: The disclosure describes a method of progressively decoding a digital watermark on a distributed computing platform. A client device equipped with a digital camera, such as a PDA or cell phone, captures a digital image of a watermarked object, and pre-filters the image to isolate a portion of the image data suspected of containing a digital watermark. The pre-filter de-correlates a portion of the image data suspected of containing a digital watermark from the remaining host image signal using a predictive filter. The client then quantizes the filtered data and progressively transmits the quantized data to a watermark decoder. The progressive transmitter sends image data as necessary to achieve a valid decoding operation. To reduce bandwidth requirements, the transmitter starts with the most highly quantized version of the filtered image, and sends lesser quantized versions until the watermark decoder completes a successful decoding operation.Type: GrantFiled: October 16, 2001Date of Patent: April 20, 2004Assignee: Digimarc CorporationInventors: Trent J. Brundage, Brett T. Hannigan
-
Patent number: 6718045Abstract: A method of inserting a watermarking signal (w) in a set (X) of coefficients (Xi) representing a digital image (I), in which at least one subset of coefficients is modified by said watermarking signal (w), comprises, for each representative coefficient (Xi) to be modified, a step of determining a neighborhood (V(Xi)) of the representative coefficient (Xi) to be modified, in the image (I); a step of selecting a neighborhood (Vsimd) in a dictionary of neighborhoods representing coefficients representing the image (I), according to a predetermined criterion of similarity with the neighborhood (V(Xi)) of the representative coefficient (Xi) under consideration; and a step of modifying the representative coefficient (Xi) as a function of the watermarking signal (w) and a predetermined masking data item (M(Vsimd)) representing the masking effect on a watermarking signal, of the neighborhood (Vsimd) selected in the dictionary.Type: GrantFiled: January 9, 2001Date of Patent: April 6, 2004Assignee: Canon Kabushiki KaishaInventors: Ioana Donescu, Eric Nguyen
-
Patent number: 6711680Abstract: A method and system for generating messages from which it can be verified that a variable does not exceed a predetermined limit. The message can be a postal indicium. A message originator, which can be a postage metering system, receives a message in the form R−k(T), where R is a trapdoor function, K is an integer equal to the limit, and T is a plain text, from a data processing center which maintains the inverse function R−1 in secrecy. The message originator computes Sm=Rm(R−k(T), where m is a current value of the variable, and incorporates Sm into the message. A verifier verifies that m<K by confirming that Rk−m(Sm)=T. The verifier cannot compute Rk−m(Sm) for m<K since it does not have R−1. For the same reason the originator cannot compute R−k′(T), k′>K, from R−k(T).Type: GrantFiled: December 9, 1999Date of Patent: March 23, 2004Assignee: Pitney Bowes Inc.Inventor: Robert A Cordery
-
Patent number: 6711276Abstract: A watermark information embedding method, and apparatus, capable of suppressing the quality degradation of contents and increasing the survivability of embedded information. When embedding watermark information in moving picture data formed of a plurality of still picture frames arranged in time series, a motion vector representing a property specific to moving picture is detected for each of image blocks generated by dividing a target frame. According to a motion quantity, a pixel change factor specifying rule is selected for each block. Out of pixels permitted to be changed in luminance depending upon the state of an image in each block representing a property specific to still picture, as many pixels as a number specified by the selected rule are selected. Luminance change processing for forming watermark information is conducted on the selected pixels.Type: GrantFiled: December 3, 1999Date of Patent: March 23, 2004Assignees: Hitachi, Ltd., Sony Corporation, Pioneer Electric CorporationInventors: Hiroshi Yoshiura, Isao Echizen, Takao Arai, Hiroyuki Kimura, Toshifumi Takeuchi, Yoshiaki Moriyama, Kazumi Sugaya, Akira Ogino
-
Patent number: 6690794Abstract: An electronic ticket system for virtually preventing forgery, copying and other unauthorized uses of electronic tickets; for proving to a third party the contents of an electronic ticket contested between a user and an issuing party; and for protecting users' anonymity upon ticket use. The system comprises a ticket creating and issuing device, a ticket proving device, and a ticket verification device. A ticket creating unit in the ticket creating and issuing device creates specifications of a ticket representing a predetermined service or product in response to a ticket creating request. A ticket issuing unit of the ticket creating and issuing device, in reply to a ticket issuing request, issues the corresponding ticket using as input a ticket identifier, a proving identifier, a ticket specification identifier, and ticket added information. The ticket proving device gets a ticket issued by the ticket issuing unit and communicates with the ticket verification device to prove the possession of the ticket.Type: GrantFiled: July 10, 1998Date of Patent: February 10, 2004Assignee: Fuji Xerox Co., Ltd.Inventors: Taro Terao, Mitsuhisa Kamei, Hisashi Nakatsuyama
-
Publication number: 20040008842Abstract: Methods and apparatus are provided for securely printing a print job on a networked printer. An application program running on a networked computer instructs the printer to generate and exchange cryptographic keys. The application program then encrypts the print job using the keys, and then communicates the encrypted print job to the printer. The printer decrypts the received print job and prints the document.Type: ApplicationFiled: July 10, 2002Publication date: January 15, 2004Inventors: Mike Partelow, Truxton Fulton, Mehran Faramani
-
Patent number: 6678390Abstract: A method and computer program for extracting an embedded message from a digital image, the embedded message being formed by convolution with a carrier, employs a message template indicating the relative locations of data in the embedded message, the relative locations of the data being such that the autocorrelation of the message template is strongly peaked. An arbitrary region of the digital image is correlated with the carrier to extract a cyclically shifted message from the digital image. The absolute value of the cyclically shifted message is taken to form a positive valued cyclically shifted message. The positive valued cyclically shifted message is correlated with the message template to form a shifted offset image having a peak amplitude representing the location of the message boundary. The location of the message boundary is employed to extract the hidden message.Type: GrantFiled: December 2, 1999Date of Patent: January 13, 2004Assignee: Eastman Kodak CompanyInventor: Chris W. Honsinger
-
Patent number: 6665417Abstract: A digital watermark information judging method is provided for detecting digital watermark information which is embedded in at least one element of digital data by altering at least one data value of the element. The method first estimates the data value of the element by using data values of at least two neighboring elements of data located near the element, then compares the estimated data value with an actual data value of the element to detect the amount of the alteration, and judges the presence and value of the digital watermark information based on the amount of the alteration.Type: GrantFiled: December 2, 1999Date of Patent: December 16, 2003Assignee: Hitachi, Ltd.Inventors: Hiroshi Yoshiura, Kousuke Anzai, Yutaka Kurosu
-
Patent number: 6633652Abstract: A method of inserting an additional information item for authenticating a digital signal decomposed into a set of coefficients (Xij), each coefficient being represented in 16 bits, and the additional information being represented by a set of binary values (wij) of the same size as the set of coefficients (Xij), includes the steps of calculating (E5, E6), for at least one coefficient (Xij), a check bit (Cij) in accordance with a predetermined operation as a function of the first 15 bit planes of the coefficient (Xij), of calculating (E7, E8) a last bit plane (X0ij) in accordance with a predetermined rule which is reversible as a function of the check bit (Cij) and a binary value (wij) of the additional information item (W) and of substituting (E7) the last calculated bit plane (X0ij) for the last bit plane of the coefficient (Xij).Type: GrantFiled: November 30, 1999Date of Patent: October 14, 2003Assignee: Canon Kabushiki KaishaInventor: Ioana Donescu
-
Patent number: 6615354Abstract: A relation between the data process contents in an IC card chip and the consumption current of the IC card chip is reduced. Prior to executing an input data process of the IC card chip, the input data is transformed to thereby reduce the relation between the process data and the consumption current of the IC card chip. After the transforming process, the transformed data is untransformed to obtain a correct process result.Type: GrantFiled: March 20, 2000Date of Patent: September 2, 2003Assignee: Hitachi, Ltd.Inventors: Masaru Ohki, Yasuko Fukuzawa, Susumu Okuhara, Masahiro Kaminaga
-
Patent number: 6600823Abstract: The invention is a method for creating a self-authenticating value document at a senders location and for verifying it at a receivers location. At the senders location a document is created having a machine readable data field, a taggant containing extractable first tag data, and a storage medium with clear text data and the first tag data extracted from said taggant written on it. The clear text, first tag data and data from a machine readable data field collectively make up a document message. The document message is hashed with a hashing algorithm to create a first message digest. The first message digest is digitally signed with a private key to create a digital signature which is written on the storage medium in addition with the clear text data, and the first tag data.Type: GrantFiled: October 16, 1997Date of Patent: July 29, 2003Assignee: Unisys CorporationInventor: Thomas D. Hayosh
-
Patent number: 6577744Abstract: A robust means of watermarking a digitized image with a highly random sequence of pixel brightness multipliers is presented. The random sequence is formed from ′robust- watermarking-parameters′ selected and known only by the marker and/or the marking entity. A watermarking plane is generated which has an element array with one-to-one element correspondence to the pixels of the digitized image being marked. Each element of the watermarking plane is assigned a random value dependent upon a robust random sequence and a specified brightness modulation strength. The so generated watermarking plane is imparted onto the digitized image by multiplying the brightness value or values of each pixel by its corresponding element value in the watermarking plane. The resulting modified brightness values impart the random and relatively invisible watermark onto the digitized image. Brightness alteration is the essence of watermark imparting.Type: GrantFiled: June 16, 1998Date of Patent: June 10, 2003Assignee: International Business Machines CorporationInventors: Gordon Wesley Braudaway, Frederick Cole Mintzer
-
Patent number: 6574350Abstract: Image, video, or audio data is encoded with both a frail and a robust watermark. The two watermarks respond differently to different forms of processing (e.g., copying the object may render the frail watermark unreadable), permitting an original object to be distinguished from a processed object. Appropriate action can then taken in response thereto.Type: GrantFiled: February 3, 2000Date of Patent: June 3, 2003Assignee: Digimarc CorporationInventors: Geoffrey B. Rhoads, Ammon E. Gustafson
-
Publication number: 20030099353Abstract: A method of printing a document (10) stored at a home computing system (5) on a printer (9) of a remote computing system, the home and remote computing system including a home trusted print proxy (HTPP) (3) and a remote trusted print proxy (RTPP) (2), respectively, which are configured to be able to establish communication via a communications link, in which the printer (9) includes a digital identification device (1) configured to provide a printer public key of a cryptographic public key/private key pair and the RTPP (2) is configured to supply a one time token on request, the method including the steps of using a mobile device (4) to interrogate the RTPP (2) and printer (9) to obtain a one time token and the printer public key using the mobile device (4) to transmit to the home computing system (5) a print request including the one time token and printer public and identification of the document (10) to be printed establishing a secure communications channel between the home and remote computing system viaType: ApplicationFiled: October 15, 2002Publication date: May 29, 2003Inventors: Cheh Goh, David A. Clarke
-
Patent number: 6571336Abstract: A method for securing passwords, personal identification numbers and identifying patterns utilizes a MasterCode camouflaged within a grid which contains all the characters, symbols or pictograms of which the MasterCode is a subset. For securing numeric sequences, the MasterCode is comprised of ten characters randomly associated to a corresponding digit (including zero). The characters thereby associated with each numeric password are expanded into an ordinary, natural language word, a SecureWord using non-associated letters. The MasterCode is masked by its unique placement in a MasterGrid known only to the user. For securing passwords comprised of alpha numeric symbolic characters, each unique character, the MasterCode, is assigned a sequential number which becomes a sequence of positions in the MasterGrid with each MasterCode character placed in the appropriate position and the remainder of the character set filled in. SecureNumbers are the positions in the MasterGrid of each character in a password.Type: GrantFiled: October 4, 2001Date of Patent: May 27, 2003Inventor: A. James Smith, Jr.
-
Patent number: 6561425Abstract: Computer-based products such as postal security devices are manufactured as generic, nondescript units. Each has a unique identifier or embedded hardware serial number readable by data communications such as serial electrical communications. At customization time, a human-readable marking is placed on the device, along with a bar code indicative of the human-readable marking. A bar-code reader reads the bar code. The embedded hardware serial number is read. A record is made in a database indicative of the embedded hardware serial number and the bar code information. Software may then be selected based on the bar code information, and loaded into the device, typically within a cryptographically secure area within the device. At a later time the device may be retired from service and reprogrammed, in which case a new human-readable marking and bar code are affixed to the device. The embedded hardware serial number and new bar code information are read and appropriate new data records are created.Type: GrantFiled: December 28, 2001Date of Patent: May 13, 2003Assignee: Ascom Hasler Mailing Systems Inc.Inventors: Roman Kresina, George Brookner
-
Publication number: 20030079137Abstract: A system and method for identifying who sent a particular piece of mail or parcel. A positive identification is made of anybody trying to mail a letter or parcel (or send something by any other means) using digital techniques such as fingerprint scan, retinal scan, face scan, DNA or any other positive ID technique. An optional photo can be taken of the sender. The positive identification information and photo is then attached to the item to be sent after the item is out of the control of the sender. The data can be attached by microdot, magnetic strip, ink spray, barcode, or by any other means of attaching digital data to an item. The sidewalk mailbox is replaces with a remote mail station. Positive ID would be a prerequisite for mailing any letter.Type: ApplicationFiled: October 24, 2001Publication date: April 24, 2003Inventor: Clifford H. Kraft
-
Patent number: 6549624Abstract: The invention relates to an apparatus and method for enhancing the security of selected information associated with a negotiable document, such as the monetary value of a cheque. In the invention, one or more security features are printed or applied onto the cheque. One such security feature is an encrypted control code. The preferred embodiment employs a secret key cryptographic scheme to encrypt the monetary value and thereby generate a first control code which is printed on the cheque. When the cheque is presented for payment, a validator, such as bank or cheque clearing house, employs a verification system having a copy of the encryption key to read the monetary value from the cheque and re-encrypt it according to said scheme to generate a second control code. The cheque is not honored if the first and second control codes are not identical. Another security feature is a security image, composed, for instance, from a foreground image of the monetary value superimposed over a background motif image.Type: GrantFiled: May 4, 2000Date of Patent: April 15, 2003Inventor: Calin A. Sandru
-
Patent number: 6546129Abstract: In case of managing image data among plural image processing apparatuses, an object of the present invention is to suppress or restrain, as much as possible, that the image data is illegally or unfairly used. In order to achieve the object, e.g., it is provided an image processing apparatus which is connected to an external apparatus being an output destination of the image data, the image processing apparatus comprises an input means for inputting the image data representing an image, an addition means for adding additional information capable of specifying the external apparatus to the image data inputted by the input means, in a state that the additional information is difficult to be perceived by human eyes, and an output means for outputting the image data to which the additional information was added by the addition means, to the external apparatus.Type: GrantFiled: November 4, 1997Date of Patent: April 8, 2003Assignee: Canon Kabushiki KaishaInventors: Takatoshi Ohta, Ryuichi Arai, Munehiko Ohta, Hiroaki Sugiura, Toshihiro Nakazawa, Takeshi Yamazaki
-
Publication number: 20030063744Abstract: Systems and methods for validating electronic signatures contained in a printable document prior to allowing the document to be printed. The systems and methods may be incorporated into a printing device or a computer. Documents without electronic signatures are printed normally. If the document contains one or more electronic signatures, then the electronic signature(s) must be validated before the document is allowed to print. Validation is accomplished by comparing a public key contained in the electronic signature to a public key stored in an electronic signature database. If the electronic signature is validated, then the document may print.Type: ApplicationFiled: September 28, 2001Publication date: April 3, 2003Inventor: Travis J. Parry
-
Publication number: 20030059050Abstract: An authentication method for authenticating an article in a device includes the steps of a) reading an identification number stored on the article, b) reading an authentication number stored on the article, c) determining an input number based at least in part on the identification number, d) applying an authentication function to the input number to calculate an output number, e) determining that the article is authentic only if the authentication number corresponds to the output number, and f) permitting use of the article in the device if the article is authentic, and disabling use of the article in the device if the article is not authentic.Type: ApplicationFiled: June 6, 2002Publication date: March 27, 2003Inventors: Clive P. Hohberger, Boris Y. Tsirline
-
Patent number: 6538759Abstract: An non-reproducible image formation preventing apparatus has a recognition section, a storage section and a comparison/determination section. The recognition section performs recognition processing for received image data, determines whether or not the image data is an non-reproducible image, and outputs the determination result to an image formation section. The storage section stores non-reproducible image data recognized as an non-reproducible image by the recognition section. The comparison/determination section compares the non-reproducible image data stored in the storage section with an image based on input image data given through an image process section and finding a match degree therebetween. If either of the comparison/determination section and the recognition section determines that the image is an non-reproducible image, a detection signal is sent to the image formation section for stopping normal print.Type: GrantFiled: June 4, 1999Date of Patent: March 25, 2003Assignee: Omron CorporationInventors: Junji Hiraishi, Kiyoshi Imai, Takashi Kakiuchi, Keitaro Taniguchi
-
Publication number: 20030041269Abstract: In a printer system in which a plurality of virtual printers can be set, virtual printer names are properly used to select ordinary printing and security printing whose contents should be kept confidential. When print data whose contents should be kept confidential is printed, a virtual printer name for security printing, e.g., “sp2351”, is set upon directing printing. A printer identifies the virtual printer name for security printing by a part “sp”, and temporarily stores the contents to be printed in a memory. Subsequently, when the user inputs “2351” directly to the printer, printing is done.Type: ApplicationFiled: August 8, 2002Publication date: February 27, 2003Applicant: International Business Machines CorporationInventors: Yoshio Kurishita, Katsuhiro Toyofuku
-
Publication number: 20030035539Abstract: The present invention is drawn to system and method for securely distributing secure documents over a network such that an intended recipient can print the secure document data using a home or office desktop printer. The secure document is printed on a specialty paper that includes integral therewith, a first authenticating code. The first authenticating code may be derived from any practical identification technology such as RFID. To generate a secure document, an appropriate detector is integrated into a desktop printing platform. The detector reads the first authenticating code from the specialty paper, which is communicated to a first transaction processor. The first transaction processor provides a second authenticating code and any other secure document data pertinent to the transaction, which is communicated back to the requestor of the secure document and printed on the specialty paper.Type: ApplicationFiled: August 17, 2001Publication date: February 20, 2003Inventor: Daniel D. Thaxton
-
Patent number: 6510514Abstract: A device for reliably creating electronic signatures that includes a data carrier read/write device, a data generating device, and a display device. The data carrier read/write device is for receiving a portable data carrier storing a user-specific key and an algorithm used to generate an electronic signature. The data generating device is connected to the data carrier read/write device for transmitting data to the data carrier read/write device. The display device is connected to the data generating device to display the data that has been transmitted to the data carrier read/write device. The data carrier read/write device includes an actuating element operatively connected to the data carrier read/write device and operatively connected to the portable data carrier when the portable data carrier is received by the data carrier read/write device.Type: GrantFiled: February 7, 2000Date of Patent: January 21, 2003Assignee: Infineon Technologies AGInventor: Holger Sedlak
-
Publication number: 20030007637Abstract: Encryption of documents is used to restrict access to such documents to those users who have the appropriate decryption keys. The encryption of documents on public web servers hitherto has prevented indexing by search engines. By keeping words and possible sentences or paragraphs intact in the encrypted document but re-ordering elements of the document to prevent the document being human-readable, the possibility of encrypted documents being indexed by search engines is provided.Type: ApplicationFiled: June 21, 2002Publication date: January 9, 2003Inventor: David Murray Banks
-
Patent number: 6470449Abstract: A computer diary archives a diary entry by creating, time stamping, authenticating and permanently storing a reference data block along with each diary entry. An archived diary entry can only be modified by placing original text within compartment codes, such as cross-out or tear-out codes, and by placing inserted text within insertion codes so that the original diary entry can be recreated from the modified diary entry. The reference data block, which can be the original diary entry, a canonical version of the original diary entry, or a one way fixed length encryption (hash) of the original diary entry, cannot be modified and is used to authenticate the original diary entry. The diary program also monitors text entry for aliases and relative date phrases, and upon detection, prompts the user for entry or enters a specific identifier for each detected alias in an alias compartment or an absolute date for each relative date phrase in an implied date compartment in the diary entry.Type: GrantFiled: February 17, 1994Date of Patent: October 22, 2002Inventor: Robert Roy Blandford
-
Publication number: 20020131593Abstract: A system and method for sending a print job to a preselected recipient. The method includes encrypting a data stream received in a first peripheral device; and transmitting the encrypted data stream from the first peripheral device to a second peripheral device.Type: ApplicationFiled: March 19, 2001Publication date: September 19, 2002Inventor: Travis J. Parry
-
Patent number: 6442276Abstract: A method of verifying the authenticity of goods includes generating one or more random codes and storing the one or more random codes in a database. The goods are then marked with one of the generated random codes such that each of the goods contain their own unique random code. Upon field checking and inventory of marked goods and comparing the codes on the marked goods to codes within the database, the authenticity of goods may be verified. Also, a system for verifying the authenticity of goods includes a database containing a plurality of unique random codes and an indication whether each of the unique random codes has been read, and a code reader or scanner for reading the code affixed to a good.Type: GrantFiled: July 21, 1997Date of Patent: August 27, 2002Assignee: Assure Systems, Inc.Inventor: Frank A. Doljack
-
Patent number: 6442691Abstract: A computer diary archives a diary entry by creating, time stamping, authenticating and permanently storing a reference data block along with each diary entry. An archived diary entry can only be modified by placing original text within compartment codes, such as cross-out or tear-out codes, and by placing inserted text within insertion codes so that the original diary entry can be recreated from the modified diary entry. The reference data block, which can be the original diary entry, a canonical version of the original diary entry, or a one way fixed length encryption (hash) of the original diary entry, cannot be modified and is used to authenticate the original diary entry. The diary program also monitors text entry for aliases and relative date phrases, and upon detection, prompts the user for entry or enters a specific identifier for each detected alias in an alias compartment or an absolute date for each relative date phrase in an implied date compartment in the diary entry.Type: GrantFiled: February 27, 1995Date of Patent: August 27, 2002Inventor: Robert Roy Blandford