Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


FACSIMILE CRYPTOGRAPHY

Subclass of:

380 - Cryptography

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380243000FACSIMILE CRYPTOGRAPHY58
20080199008Image forming device and image forming method - An image forming device, to which an external storage is detachably connected, is provided with a first password acquiring unit configured to acquire a password input by a user when print data is to be encrypted, and an encrypting unit configured to encrypt the print data in accordance with the password acquired by the first password acquiring unit and store the encrypted print data in the external storage. The image forming device is further provided with a second password acquiring unit configured to acquire a password input by the user when the encrypted print data is to be printed, a decrypting unit configured to decrypt the encrypted print data in accordance with the password acquired by the second password acquiring unit, and a printing unit configured to print the print data which is encrypted by the encrypting unit and then decrypted by the decrypting unit.08-21-2008
20080267402Image Forming Apparatus, Image Forming Method, Information Processing Apparatus and Information Processing Method - In an image forming method of receiving encrypted data generated by an information processing apparatus, decrypting the encrypted data into data to be printed, and causing an image forming apparatus to execute printing processing, print data is acquired by decrypting the received encrypted data, and the acquired print data is converted into image data for which the printing processing can be performed. The image data is encrypted with first key information.10-30-2008
20080279380Information Processing Method, Information Processing Device, Computer Program For Achieving the Information Processing Method, and Computer-Readable Storage Medium of Storing the Computer Program - The present invention aims to provide the technique of appropriately enabling the encryption and decryption to the partial area with respect to the image data to which the partial encryption and the multiple encryptions have been applied. More specifically, the predetermined image area in the image data is acquired by a reproduction area designation unit, the overlap area of the acquired image area and the encrypted encryption area is calculated by an overlap judgment unit, the key information corresponding to the calculated overlap area is acquired by a decryption key acquisition unit, and the image data corresponding to the overlap area is acquired by a decryption key acquisition unit, and the image data corresponding to the overlap area is subjected to the encryption and decryption by an image decryption unit by using the acquired key information.11-13-2008
20090003601ALPHA-MASKED IMAGE MATCHING - A method and system is disclosed for authenticating a physical medium (01-01-2009
20090022312APPARATUS AND METHOD FOR DOCUMENT SYNCHRONIZATION - A computer readable storage medium includes executable instructions to convert a destination document into a destination document tree hierarchy. The destination document tree hierarchy is flattened into a destination document hash table comprising a set of destination document keys and a set of destination document values. A source document is converted into a source document tree hierarchy. The source document tree hierarchy is flattened into a source document hash table comprising a set of source document key-value pairs. A source document key-value pair comprising a key and a value is identified, where the key is not in the set of destination document keys. The source document key-value is added to a changelist. A destination document key is identified, where the destination document key is not a key in a key-value pair in the set of source document key-value pairs. The destination document key is added to the changelist.01-22-2009
20090022313ENCRYPTED DATA PROCESSING METHOD, ENCRYPTED DATA PROCESSING PROGRAM AND ENCRYPTED DATA PROCESSING APPARATUS - An encrypted data processing method for a printing system provided with a host which transmits print data or encrypted data formed by encrypting the print data, and an image forming apparatus connected with the host via a communication network to execute printing based on the print data, the method including: a first step of determining, in the image forming apparatus, whether transmitted data from the host is the encrypted data; a second step of executing printing process in cases where the transmitted data is not the encrypted data, and decrypting the encrypted data in cases where the transmitted data is the encrypted data; and a third step of executing the printing process in cases where the decryption of the encrypted data has been successfully executed, and storing the encrypted data into a storage section in cases where the decryption has failed.01-22-2009
20090046856METHODS AND APPARATUS FOR ENCRYPTING, OBFUSCATING AND RECONSTRUCTING DATASETS OR OBJECTS - A method of encrypting or obfuscating a first dataset, the dataset comprising a plurality of data elements, the method comprising distributing the data elements among one and at least one other of a plurality of discrete further datasets. Also provided is a method of reconstructing a first dataset from two or more further datasets, comprising mapping the said two or more further datasets onto one another. Inter alia, the disclosure further provides apparatus and documents comprising a plurality of layers, wherein the layers may be rotated, separated or otherwise manipulated to encrypt, obfuscate or reconstruct an object, pattern or image formed by the layers.02-19-2009
20090067627Method and System for Transmitting Data From a First Data Processing Device to a Second Data Processing Device - The present invention relates to a method and a system for transmitting data from a first data processing device (03-12-2009
20090136032IMAGE READING APPARATUS AND IMAGE FORMING APPARATUS - An image reading apparatus includes: an original reading section reading an image from an original and generating image data on the read image; a key generation section generating a key for encrypting on the basis of the image data generated by the original reading section; an encrypting section encrypting the image data generated by the original reading section with the key generated by the key generation section; and a transmission section transmitting the image data encrypted by the encrypting section to a terminal connected with the outside.05-28-2009
20090214033IMAGE ENCRYPTION APPARATUS AND IMAGE DECRYPTION APPARATUS - Area data indicating an encryption area of image data and level data indicating an authority level for the encryption area are received. Upon being triggered by an input password, an encryption key is generated for each received authority level. Check data to be detected in verifying whether or not the encrypted image data in the encryption area is appropriately decrypted through decryption is implanted in the encryption area. Image encryption is performed on the encryption area where the check data is implanted, by using the encryption key corresponding to the authority level designated for the encryption area. In decryption, all decryption keys corresponding to all authority levels lower than or equal to the set authority level are used to decrypt each encryption area and determines whether or not an appropriate decryption has been performed on the basis of the result of the detection of the check data.08-27-2009
20090238364IMAGE SCANNER - A scanner includes a scanning unit which scans an object to generate scan data, a scan data storage, a location information transmitting unit configured to transmit location information indicative of a location where the scan data is stored to an external device, a device-location storage stores device-location information including device identifying information used for identifying a device to which the scan data generated by the scanning unit is transmitted and the location identifying information in a associated manner, a reception unit receives combination information representing a combination of the device identifying information and the location identifying information, and a scan data transmitting unit configured to transmit the scan data stored at a location identified by the location identifying information to the device identified by the device identifying information on condition that the combination represented by the combination information received by the reception unit is stored in the device-location storage.09-24-2009
20090323950Image encryption/decryption apparatus, method and program - An image encryption apparatus encrypts a digital image by specifying a partial region from the digital image, converting the selected partial region into a processing image based on an encryption key, and specifying a position of the partial region by regularly converting a pixel value of the processing image.12-31-2009
20100008504Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method - The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and a control unit performs control as to whether to obtain the device information through a wireless communication unit or obtain the device information through a wire communication unit, and as to whether to transmit image information encrypted by a first encryption unit from the wireless communication unit or transmit image information encrypted by a second encryption unit from the wire communication unit when the verification unit verifies that the data receiving apparatus is authorized.01-14-2010
20100014668Image data verification program recorded on a recording medium, image data verification method, and image data verification system - An image data verification system for verifying image data using a computer and method are provided. The method includes registering image data of an original and extracting information regarding a part of information forming the original image data. The method also includes generating a feature value of the partial information and generating signature information.01-21-2010
20100027793FACSIMILE COMMUNICATION SYSTEM, FACSIMILE APPARATUS, FACSIMILE COMMUNICATION METHOD, TRANSMISSION PROCESSING METHOD, AND RECEPTION PROCESSING METHOD - A facsimile communication system which is capable of selectively performing encrypted communication or non-encrypt communication according to the intention of a user. A transmitting-side digital multifunction machine inputs the port address of a receiving-side digital multifunction machine according to a user operation, and designates encrypted communication for transmitting IFP packets of image information, via an IP network, after encrypting the IFP packets, or non-encrypt communication for transmitting IFP packets of image information, via the IP network, without encrypting the IFP packets. The receiving-side digital multifunction machine determines whether the input port address is for an encrypted communication port or a non-encrypt communication port, and sends a response containing an associated port number to the transmitting-side digital multifunction machine. The transmitting-side digital facsimile apparatus establishes connection to the port with the port number, and performs the designated communication.02-04-2010
20100034380SCANNING APPARATUS, HOST APPARATUS AND SCAN IMAGE PROCESSING METHOD THEREOF - A scanning apparatus, a host apparatus and a scan image processing method thereof. The scan image processing method of the scanning apparatus includes generating a scan image by using a scan target document, obtaining an encryption key which includes color space information, and performing encrypting for the scan image by using the encryption key.02-11-2010
20100046753INFORMATION OUTPUT SYSTEM, METHOD, AND PROGRAM FOR TAMPERING DETECTION - An information output system for tampering detection 02-25-2010
20100067694FILE-TRANSMITTING METHOD AND SCANNING DEVICE USING THE SAME - A file-transmitting method and a scanning device are provided. A document is scanned and an image file of the document is generated. The image file is stored to a remote storage device. File-access data for accessing the image file is generated. The file-access data is transmitted to a receiving destination. The scanning device includes a scanning head assembly, a processing unit and a transmitting unit. The scanning head assembly scans a document and generates an image file of the document. The processing unit, electrically coupled to the scanning head assembly, processes the image file and generates file-access data for accessing the image file. The transmitting unit, electrically coupled to the processing unit, transmits and stores the image file to a remote storage device, and transmits the file-access data to a receiving destination.03-18-2010
20100074442Image Scanning System, and Image Scanner and Computer Readable Medium Therefor - An image scanning system includes an image scanner and a terminal device connected with the image scanner. The terminal device accepts a password, stores an image encryption key, encrypts the image encryption key with the password, sends the encrypted image encryption key to the image scanner, receives image data encrypted from the image scanner, and decrypts the image data encrypted using one of the image encryption key and an image decryption key corresponding to the image encryption key. The image scanner receives the encrypted image encryption key from the terminal device, accepts a password, decrypts the encrypted image encryption key with the password, performs document scanning to create image data, encrypts the image data using the image encryption key decrypted, and sends the image data encrypted to the terminal device.03-25-2010
20100074443IMAGE ENCRYPTION AND IMAGE DECRYPTION APPARATUS AND METHOD - Input data is converted into an image, and in the input image, an encryption region that is a region in which the image is to be encrypted. Meanwhile, on the basis of an encryption key, encryption key-related information that is information related to the encryption key is generated, and the encryption key-related information is embedded into the image in the encryption region, to generate a first intermediate image. Next, the first intermediate image is converted on the basis of the encryption key, to generate a second intermediate image. Then, the pixel values of the second intermediate image are converted so that the position of the encryption region can be specified. As a result of the conversion, an encrypted image in which the part corresponding to the encryption region in the input image is generated.03-25-2010
20100086131SYSTEM AND METHOD FOR REMOTE SIGNATURE ACQUISITION - A system for remote signature acquisition, includes a local computer located in a first position where a document is needs to be executed, a remote computer located at a second position, a camera connected to the local computer, a tablet connected to the remote computer, and a plotting instrument connected to the local computer. The remote computer is connected to the local computer via a network. The camera presents information of the document to the remote computer via the local computer and network for display at the second position. The tablet records the corresponding input thereon and converts the input to a digital signal which is capable of being transmitted to the local computer via the remote computer and network. The local computer directs the plotting instrument to inscribe the corresponding input on the document according to the digital signal.04-08-2010
20100111301SYSTEMS AND PROCESSES OF PROTECTION AND AUTOMATIC VERIFICATION OF PAPER DOCUMENTS AGAINST FALSIFICATION, ADULTERATION AND LEAKAGE - Protection of documents printed in paper is provided by processes for detection, immediately and clearly, of different types of falsification, adulteration, inclusion and omission. A network accessible system is capable of detecting several fraud aspects. A “Remote Expertise Center” or a remote service data center accessible from and to any location in which there is a connection to the network, such as through the Internet provides customized protection and automatic verification of document pages. Documents pages are generated by the Remote Expertise Center and transmitted to remote printers, bypassing user operational system, using a specific driver of each printer, avoiding any access to protected document before effective printing. Documents include multiple types of security features, such that in the event that any of them is surpassed, the document will remain protected by the other types of security protection. Security features may include, among others, background images, computer readable code containing the printed content, identification information readable only with a predetermined optical filter, a copy alert that changes appearance when the printed document is copied, and personalized items to identify individuals responsible for non authorized document disclosure or leakage.05-06-2010
20100119067ELECTRONIC DOCUMENT ENCRYPTING SYSTEM, DECRYPTING SYSTEM, PROGRAM AND METHOD - An electronic document encrypting system 05-13-2010
20110026708RECORDING MEDIUM, METHOD FOR MANUFACTURING THE SAME AND APPARATUS FOR REPRODUCING THE SAME - There is disclosed a method for generating data for a recording medium. The method includes receiving original content data representing a plurality of still images and identifying a first subset of the still images to be recorded with copy-protection and a second subset of the still images to be recorded without copy-protection. The method also includes converting data representing the first subset into moving image data and copy-protecting the moving image data. The method also includes generating new content data, the new content data including the copy-protected moving image data and data representing the second subset.02-03-2011
20110164748Packaging film for product authentication, authentication method and system - A packaging film which contains pigment particles randomly distributed in a low surface-area density is used for the authentication of products. An imaging device is used to record a first digital image of a packaged product. The positional coordinates, and optionally the color values, of the pigment particles contained in the packaging film are determined from the digital image by means of a computer program and an identification code is calculated from the coordinate or color values and stored in a database. To authenticate the product at a later time, a second digital image is recorded and a test code is determined and compared with the recorded identification code.07-07-2011
20110311046Image Forming System, Image Forming Apparatus, and Method in which an Application is Added - An image forming system includes a first computer, a second computer, and an image forming apparatus. The first computer is configured to provide an application file to a first special hash function and generate a first special hash value corresponding to an input first parameter value. The second computer is configured to generate an installation package file including the application file and the first special hash value. The image forming apparatus is configured to provide the application file to a second special hash function that is the same as the first special hash function, generate a second special hash value corresponding to a second parameter value that is stored in the image forming apparatus and that is the same as the first parameter value, and perform a specified process to the application file if the first special hash value matches the second special hash value.12-22-2011
20120076297TERMINAL FOR USE IN ASSOCIATING AN ANNOTATION WITH AN IMAGE - There is also provided a terminal for use in associating an annotation with an image. The terminal can comprise a processor, one or more computer readable storage mediums, an imaging assembly, first program instructions to obtain an annotation from a source in response to the terminal capturing an image, second program instructions to create an image header defined by a standard, and third program instructions to store the image header, the image, and the annotation in a data structure on the computer readable storage medium. The first, second, and third program instructions can be stored on the one or more computer readable storage mediums for execution by the processor. There is also provided a computer program product and a computer system for rendering a data structure comprising an annotation and an image on a display.03-29-2012
20120121086IMAGE ENCRYPTION/DESCRYPTION DEVICE, METHOD, AND STORAGE MEDIUM STORING A PROGRAM - At the time of marker attachment (at the time of encryption), for example, image conversion in which pixels to be overwritten by a marker are selected and pruned in a distributed manner and the pruning positions are moved to a marker attachment position is performed, and the marker is attached to the marker attachment position obtained as a result. At the time of marker elimination (at the time of decryption), for example, image reverse conversion in which each pixel of the marker is moved to the original position before the marker attachment is performed, each moved pixel of the marker is recovered, and the marker is eliminated.05-17-2012
20120308003AUTHENTIC BARCODES USING DIGITAL SIGNATURES - Methods and systems for generating and authenticating barcodes using digital signatures comprise: inputting graphical data representing a barcode pattern into memory; translating the graphical data into barcode information according to a standard for translating a particular type of barcode pattern into barcode information; extracting a message and a digital signature from the barcode information; and determining whether the message is authentic by determining whether the digital signature matches the message.12-06-2012
20130077786IMAGE PROCESSING APPARATUS - An image processing apparatus includes a processor configured to assign image data a first restriction to restrict a first operation on the image date and a second restriction to restrict a second operation on the image data, an output unit configured to output the image data with the first restriction and second restriction, a restriction information storage unit configured to store therein a preset first password to allow the first operation and a preset second password allow the second operation, an entry unit configured to prompt a user to enter a new first password to allow the first operation and a new second password to allow the second operation, and a selector configured to allow the user to select the preset passwords or the new passwords to be used for the assignment of the first restriction and the second restriction to the image data by the processor.03-28-2013
20130136259Scanner, Terminal and Method For Reading an Optical Code with Authenticatable Information - A scanner, terminal and method are provided for reading an optical code where a portion of the information stored in the optical code is encrypted. In accordance with an aspect of the invention, a public cryptographic key associated with the optical code is used to decrypt the encrypted portion of the information and data from the decrypted portion is used to authenticate the remainder of the information.05-30-2013
20130223625CONFIGURING AUDIOVISUAL SYSTEMS - A method, an apparatus, and a computer program product for configuring audiovisual equipment. An image captured by an imaging sensor of a camera may comprise an encoded pattern that includes information that can unlock a feature or function of a camera or other audiovisual equipment the information is extracted from the encoded pattern using an image processor of the camera, or communicatively coupled to the camera. The information may comprise encrypted information which may be decrypted using a unique identifier of the camera. The information may be transmitted to downstream audiovisual equipment and may be used to unlock features and functions of other devices. The other devices may include another camera.08-29-2013
20130272523MOBILE FIELD LEVEL ENCRYPTION OF PRIVATE DOCUMENTS - A method and system are disclosed for field level encryption of a document that provides a hardcopy having redacted sensitive information fields with multiple levels of access and an augmented reality view of the hardcopy displaying the unredacted sensitive information fields. Identification of the sensitive information fields may be accomplished via highlight color, user designation, or linguistic analysis. The identified fields are encrypted and may be stored separately, embedded in place, or embedded in a two-dimensional glyph. This information may be stored in association with a device identification of an authenticated mobile device and a document identification. A redacted hardcopy of the original document is output. A mobile device captures an image of the redacted hardcopy, decrypts the encrypted sensitive information fields, and generates an augmented reality view of the hardcopy with the previously redacted sensitive information fields visible on the display of the mobile device.10-17-2013
20130301832FINGERPRINT SCANNING SYSTEMS AND METHODS - Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic fingerprint scanning system is provided that includes a number of features for use with forensic-quality fingerprinting. One set of features of embodiments of the portable forensic fingerprint scanning system provides real-time feedback for accurate fingerprinting and training, including visual and/or audio feedback. Another set of features provides cadence-based functionality for improving fingerprinting results. Another set of features provides cryptographic-based approaches to secure highly sensitive collected fingerprint information against loss, theft, or surreptitious modification or tampering. Yet another set of features provides latent fingerprint collections and processing. Still another set of features provides various databasing functions, including centralized storage, data sharing, secure networking, etc. And another set of features provides compatibility with a large variety of jurisdiction-specific inputs and/or outputs, including linguistic interactivity, alerts, print cards, etc.11-14-2013
20140044259JOB PROCESSING SYSTEM, JOB PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM - A system for processing a job including one or a plurality of tasks, comprises: a management service server which manages a job generated by receiving the designation; and one or a plurality of task processing service servers which process one or a plurality of tasks forming the job, in order to execute processing based on the job, the management service server comprises: holding unit which holds, for each of the service servers, encryption information defining a method of encrypting and to decrypt a file corresponding to the job, and information which is used when generating a key for use in encryption and decryption; and specification unit which specifies, when receiving encryption information acquisition request, encryption information for a service server of a job corresponding to an encrypted file to be decrypted by the task processing service server.02-13-2014
20140086410IMAGE FORMING APPARATUS - An image forming apparatus includes a memory unit configured to store image data, a mode detecting unit configured to detect a transition from a first operating mode to a second operating mode, and an encryption unit configured to encrypt the image data in the memory unit based on the transition.03-27-2014
20140177836PICTURE DELIVERING SYSTEM BASED ON VISUAL CRYPTOGRAPHY AND RELATED COMPUTER PROGRAM PRODUCT - A picture delivering system is disclosed including: a picture generating device for outputting a flat picture corresponding to an encrypted picture and for providing a picture ID corresponding to the encrypted picture; and a picture presenting device for utilizing an optical imaging device to capture an image of the flat picture to generate a captured picture, for obtaining the picture ID, and for transmitting the picture ID to the picture generating device. When the picture presenting device passed an entity identification procedure, the picture presenting device obtains a decryption information, processes the captured picture according to the decryption information to obtain a decrypted picture, and then utilizes a display device to display the decrypted picture. The decryption information comprises at least one of a seed key, a mask picture, and a transposition table corresponding to the picture ID.06-26-2014
20140205095AUTHENTICATION SYSTEM AND AUTHENTICATION CODE CONVERTOR - The authentication system includes a to-be-authenticated device for generating a first authentication data; an authentication code convertor for converting the first authentication data generated by the to-be-authenticated device into a second authentication data; and an authentication device for performing authentication of the to-be-authenticated device based on the second authentication data. The first authentication data includes an authentication code obtained by encrypting challenge data output from the authentication device and input to the to-be-authenticated device through the authentication code convertor and predetermined data included in the to-be-authenticated device in accordance with an encryption method using a first encryption key; and the predetermined data included in the to-be-authenticated device. The second authentication data includes an authentication code obtained by encrypting the challenge data output from the authentication device and input to the authentication code convertor and the predetermined data included in the to-be-authenticated device.07-24-2014
20140314235APPARATUS FOR GENERATING TRUSTED IMAGE DATA, AN APPARATUS FOR AUTHENTICATION OF AN IMAGE AND A METHOD FOR GENERATING TRUSTED IMAGE DATA - An apparatus for generating trusted image data includes an image data generator, a processor and an output unit. The image data generator generates image data of an image to be taken of a three-dimensional scene and trust data of the three-dimensional scene. The trust data indicates a depth information of at least one pixel of the image to be taken or comprises data capable of being used to calculate a depth information of at least one pixel of the image to be taken. The processor generates encrypted image data by encrypting at least the trust data or characteristic data derivable from at least the trust data, so that an authentication of the image data is enabled based on the encrypted image data. The output unit provides trusted image data including the encrypted image data.10-23-2014
20140355760Method of Third Party Identification for Cryptographic Communications - The invention is aimed to work on XOR operation safely in cryptographic communications with third party identification, wherein a sender in FIG. 12-04-2014
20150086014Systems and Methods of Securing Operational Information Associated with an Imaging Device - The invention is directed to a tamper-evident method of encrypting data relating to one or more print cartridges installed in an imaging device that includes triggering a gathering of data relating to the one or more print cartridges installed in the imaging device; recording a number of instances the triggering is performed; retrieving a previously encrypted data relating to the one or more print cartridges installed in the imaging device, the previously encrypted data gathered at a time prior to the triggering; and encrypting the gathered data using the previously encrypted data.03-26-2015
20150104012METHODS, SYSTEMS, AND DEVICES FOR DELIVERING IMAGE DATA FROM CAPTURED IMAGES TO DEVICES - Computationally implemented methods and systems include acquiring a device-based encrypted image that is an image that has previously been encrypted through use of a particular device code associated with an image capture device configured to capture the image, wherein the image includes a representation of a feature of an entity, decrypting the device-based encrypted image in response to an indication that the image has been approved for decryption, and creating a client-based encrypted image through encryption of the decrypted image through use of a particular client code that is associated with a client that is linked to the image capture device configured to capture the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.04-16-2015
20150104013METHODS, SYSTEMS, AND DEVICES FOR HANDLING CAPTURED IMAGE DATA THAT IS RECEIVED BY DEVICES - Computationally implemented methods and systems include acquiring a client-based encrypted image that is a captured image that has previously been encrypted through use of a particular client code, wherein said captured image was captured by an image capture device, obtaining an indication that the client-based encrypted image was approved for decryption, said decryption configured to be carried out through use of a client-based decryption key, and procuring the client-based decryption key that is at least partly based on the particular client code, wherein the particular client code is related to a client that is associated with the image capture device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.04-16-2015
20150124965Document With Verification Data - Disclosed herein is a method of generating a document comprising verification data, the method comprising: obtaining data for inclusion on a document, wherein the obtained data includes verification data; encrypting the verification data; generating a machine readable code comprising the encrypted verification data; and generating a document comprising both the obtained data in a non-encrypted form and the machine readable code. Advantageously, an entity that is required to verify the document can decrypt the machine readable code to obtain the verification data. The encrypted nature of the data within the machine readable code ensures that the data is secure and the verification reliable.05-07-2015
20150372988SCAN IMAGE AUTHENTICATION - Methods and systems receive an electronic scanned image generated by activity of an application running on a portable computerized device, and calculate a cryptographic digest from data of the electronic scanned image using a second computerized device. Also, such methods and systems encrypt the cryptographic digest using an encryption key stored on the portable computerized device to create a content signature of the cryptographic digest, and send the content signature to the second computerized device. The authenticity of a copy of the electronic scanned image provided by the second computerized device is verified by recalculating the content signature (based on the copy of the electronic scanned image) using the encryption key from the portable device.12-24-2015
20160140350METHOD OF SECURING IMAGE DATA AND ELECTRONIC DEVICE ADAPTED TO THE SAME - An electronic device and method is disclosed herein. The electronic device may include a memory configured to store image data including at least one object, user identification information, and a specific object mapped to the user identification information, and a processor. The processor may execute the method, including extracting an object from the image data, determining whether the extracted object matches the specific object, if the extracted object matches the specific object, encrypting the image data using the user identification information mapped to the specific object as an encryption key, and storing the encrypted image data in the memory.05-19-2016
20160150122IMAGE FORMING APPARATUS, DATA TRANSMISSION METHOD, AND DATA TRANSMISSION SYSTEM - An image forming apparatus transmits a database to an external server. The image forming apparatus includes a storage section, a replication section, an encipherment section, a transmission section, a generation section, and an acquisition section. The storage section stores a database therein. The replication section generates a replica of the database stored in the storage section as a replicated database. The encipherment section enciphers the replicated database. The transmission section transmits the enciphered database to the external server each time a predetermined time period elapses. The generation section generates a deciphering key for deciphering the enciphered database. The acquisition section acquires disaster information. Upon the acquisition section acquiring the disaster information, the transmission section transmits the deciphering key to the external server.05-26-2016
380244000 Synchronization 1
20150341171VIRTUAL BANDS CONCENTRATION FOR SELF ENCRYPTING DRIVES - An apparatus includes a storage medium with an opaque key storage and a controller. The controller may be coupled to the storage medium. The controller may be configured to (i) receive from a host device an authentication key, a plurality of I/O requests, and respective virtual media encryption keys associated with a number of the I/O requests, (ii) allow the host device to access the opaque key storage in response to the authentication key received from the host device being authenticated, (iii) generate a first media encryption key for a real band based upon the authentication key from the host device and key material stored on the apparatus, and (iv) generate a number of second media encryption keys for the number of I/O requests based on the first media encryption key and each of the respective virtual media encryption keys associated with each of the number of I/O requests.11-26-2015
380245000 Nonstandard scan pattern 1
20160050341SECURITY FEATURE FOR DIGITAL IMAGING - A method including: providing an image; encrypting an encryption region of the image, the encryption region is less than the whole region of the image; keeping a remaining region of the image unencrypted to provide a partially encrypted image; and storing the partially encrypted image.02-18-2016
380246000 Including generation of an associated coded record 9
20090022314INFORMATION PROCESSING DEVICE, READ TERMINAL, NON-PUBLIC INFORMATION READ SYSTEM, NON-PUBLIC INFORMATION READ METHOD, INFORMATION PROCESSING PROGRAM, AND NON-PUBLIC INFORMATION READ PROGRAM - In a personal information access system 01-22-2009
20110194690Data Adaptive Message Embedding For Visible Watermarking - A watermarking system uses distinct bit patterns to identify a logic 0, a logic 1, and a marker bit, which demarcates segments of logic bit information. Marker bits, which are printed on both foreground and background areas of an image, outline message blocks. In message extraction, a preprocessing step removes any white boarders, identifies the best defined corner of a message block, crops the image, and rotates the image to place the identified corner at the top-left corner. Message extraction scans the rotated image in window segments of increasing size during multiple cycles. During each cycle, if a bit pattern cannot be identified as a data bit, then the size of the examined bit area is increased and rechecked to see it specifically is a marker bit. If no bit information can be definitively identified, then it is assigned a logic bit value based on a 50% random assignment.08-11-2011
20110243326HARDCOPY DOCUMENT SECURITY - A method for securing data in hardcopy documents. The method includes obtaining a page image having a private data item; generating an encrypted version of the private data item; obtaining a decoder identification (ID) value of a decoder; generating, using an encoder, a symbol having the encrypted version of the private data item and the decoder ID value; and generating a hardcopy document by recording the symbol on a physical medium, where the hardcopy document is transported to a subsystem having the decoder, and where the subsystem decrypts the encrypted version of the private data item after extracting the encrypted version of the private data item from the symbol.10-06-2011
20110268272ENCRYPTING AND STORING DATA ON AN ELECTRONIC READABLE MEDIA INCORPORATED INTO A FINANCIAL PROSPECTUS - Each of a first portion and a second portion of data is selected. Each of the first portion and the second portion of data are in the human-readable format and capable of being converted from a human-readable format to an electronically readable format. The first portion of data is encrypted and stored in a first electronically readable medium and the second portion of data is encrypted and stored in a second electronically readable medium, wherein the first electronically readable medium does not match with the second electronically readable medium. Each of the first portion and the second electronically readable medium is incorporated into the printed publication. The first portion of data is read from the first electronically readable medium using a first data reading device without removing the first electronically readable medium from the printed publication. The second portion of data is read from the second electronically readable medium using a second data reading device without removing the second electronically readable medium from the printed publication.11-03-2011
20140161255COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME AND STORAGE MEDIUM - Disclosed are a communication apparatus and a method of controlling the same. The communication apparatus sets, if it is designated to perform encrypted transmission, whether to not perform transmission to an address with respect to which encrypted transmission is not possible or to perform plain text transmission to the address, and an address is selected in a state where this setting has been configured. The communication apparatus determines whether or not the selected address is an address with respect to which the encrypted transmission is possible, and, if the result of the determination shows that the selected address is not the address with respect to which the encrypted transmission is possible, controls whether to not perform transmission to the selected address or to perform plain text transmission to the selected address, in accordance with the setting.06-12-2014
20140254795RIGHTS MANAGEMENT IN A DISTRIBUTED SCAN SYSTEM - Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on one or more printed documents. An SPD may include extension data that is used to store additional data in association with the scan data. An SPD may include rights management data that is used to provide security to the scan data that is generated based on the SPD. An SPD may be used as a print process definition for dictating how print operations are to be performed. An SPD may be associated with data that identifies one or more scan devices that are prohibited from using the SPD. An SPD may be associated with access delegation data that indicates one or more users who have been delegated access to the SPD.09-11-2014
20140254796METHOD AND APPARATUS FOR GENERATING AND/OR PROCESSING 2D BARCODE - A computer-complemented method for generating a 2D barcode, including retrieving a predetermined private key, a predetermined digital signature method and an issuer identity of a 2D barcode; generating a signature for at least one data with the retrieved private key in accordance with the retrieved digital signature method; inserting the at least one printable data together with the generated signature and the retrieved issuer identity into a self-contained data unit; and creating a barcode image containing the self-contained data unit.09-11-2014
20150356306SYSTEMS AND METHODS FOR QR CODE VALIDATION - Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the QR code using a smartphone and decrypting using the issuing entity's public key. In some embodiments, a purpose-built software application executed by the smartphone may automatically recognize QR codes on a document presented for review and then automatically decrypt the QR code using the public key of the issuing entity. A user performing the validation may then compare the document's content with the decrypted data on the smartphone.12-10-2015
20160110552Method and Apparatus for Transmission of Visually Encoded Data - A method for secured data transmission of visually encoded data from a mobile end device to a processing unit includes supplying on a security element of the end device a datum to be transmitted. The datum is encrypted in session-specific fashion through the security element. From the encrypted datum visually encoded image data are generated in the form of a bar code or a sequence of bar codes. The visually encoded image data are displayed through the end device.04-21-2016

Patent applications in class FACSIMILE CRYPTOGRAPHY

Patent applications in all subclasses FACSIMILE CRYPTOGRAPHY

Website © 2025 Advameg, Inc.