Patent application number | Description | Published |
20090092318 | ONE-SCREEN RECONCILIATION OF BUSINESS DOCUMENT IMAGE DATA, OPTICAL CHARACTER RECOGNITION EXTRACTED DATA, AND ENTERPRISE RESOURCE PLANNING DATA - Systems and methods of reconciling data from an imaged document. In one embodiment, a business document is scanned to create a business document image. A set of extracted data is extracted from the business document image via optical character recognition (OCR). The set of OCR extracted data is then compared with data in business information management or enterprise resource planning (ERP) system. A set of ERP data is retrieved from the ERP system that relates to the set of OCR extracted data. The retrieved ERP data is than assigned to the set of OCR extracted data to create a set of assigned data. The business document image is then displayed in a business document image pane, the set of OCR extracted data is displayed in the OCR data pane, and the retrieved ERP data is displayed in the ERP data pane. The set of assigned data is validated, and the ERP system is updated with the set of validated, assigned data. In other embodiments, data is extracted from text files without using OCR. | 04-09-2009 |
20090092320 | DOCUMENT RECOGNITION USING STATIC AND VARIABLE STRINGS TO CREATE A DOCUMENT SIGNATURE - Systems and methods of recognizing a business document and creating a document signature. In one embodiment, a business document is scanned and a business document image is created. The business document image is compared to a template database. If a matching template is found, document fields are defined and extracted. If no matching document template is found, the document image is compared to a skeleton database. If a matching document skeleton in found, document fields are defined and extracted. A document skeleton is generated and then stored in the template database. If no matching document skeletons are found in the skeleton database, document fields are manually extracted. A document skeleton is then generated from the identification of static and variable strings and stored in the skeleton database. Document fields are validated after all document fields have been extracted. | 04-09-2009 |
20110010356 | DIGITAL DOCUMENT MANAGEMENT SYSTEM - Embodiments of the invention relate to a software-as-a-service (“SaaS”) digital document management system (“DDMS”). The DDMS is located remotely from an office building or other place of business on a remote server. The server is connected to one or more databases for storing digital documents or information extracted from the digital documents. A user populates the DDMS by sending digital documents to the server using a computer, an email-enabled scanner, or the like. When a digital document is received at the server, the document is routed to a customer pending queue, information from the digital document is extracted, the digital document is stored in a directory, and the extracted information is stored in a relational database. The extracted information is supplemented or corrected as necessary using a web portal which allows a user to access the digital document and the extracted information. The digital document and the extracted information are then sent to a first destination such as an archive or mail-on-demand (e.g., a mail and print service). | 01-13-2011 |
20110211212 | DOCUMENT PROCESSING AND DISTRIBUTION USING CUSTOMIZED PROCESS PRINT DRIVERS - Systems and methods for automated processing and distribution of documents using a customized print driver. The customized print driver is accessed using a program application running on an Internet-enabled or networkable device. Unlike conventional print drivers which output print file from an application program to, for example, a laser printer, the customized print drivers combine a print file from the application program with specific processing and distribution parameters or preferences (i.e., a macro). The macro includes, among other things, preferences related to transport medium, transport options, and contact information. By combining the print file of the application program with the macro using a customized print driver, documents are able to be electronically prepared, processed, and distributed efficiently and with minimal user intervention. | 09-01-2011 |
20120016832 | AUTOMATED DOCUMENT SEPARATION - Systems and methods for automated document separation. The system includes a host device that is configured to communicate with one or more client devices over a network. The host device includes a splitting module, a correction module, a knowledge base, and a document store. The splitting module is configured to perform a multi-level document splitting. Pages are grouped into documents based on, for example, the sender information, the lack of sender information, and whether the sender is known. Following the initial separation, the splitting module performs an automatic correction of the initial document separation based on information stored within the knowledge base. The knowledge base is updated each time a document is processed and a user provides feedback related to whether the documents were successfully separated. Based on the success or failure of a particular document separation, the knowledge base evaluates the modifications made by a user to learn from the errors made during document separation. | 01-19-2012 |
20130318426 | AUTOMATED LEARNING OF DOCUMENT DATA FIELDS - Methods and systems for transforming at least a portion of a physical document into digital data. One method includes obtaining a first plurality of data items automatically extracted from a first physical document and a validated value for a data field. The method also includes automatically identifying a first linked data item included in the first plurality of data items that is linked to the validated value and setting a physical position included in a rule to the physical position of the first linked data item. In addition, the method includes obtaining a second plurality of data items automatically extracted from a second physical document and automatically identifying a candidate data item included in the second plurality of data items based on the rule. Furthermore, the method includes automatically populating a value for the data field for the second physical document based on the candidate data item. | 11-28-2013 |
Patent application number | Description | Published |
20120080085 | Patterned protected film - A film has an inner and an outer surface. The film includes a first layer forming the outer surface and including fluoropolymer. The film further includes a second layer disposed away from the outer surface comprising a polymer. The polymer can have a storage modulus at 65° C. of at least 5 MPa. The film has a plurality of surface features forming the outer surface and extending into the first and second layers. The surface features have a mean slope of at least 15°. The film can be applied as a protective film overlying an active component of a photovoltaic device. | 04-05-2012 |
20120282437 | FILM FOR PHOTOVOLTAIC DEVICES - A textured film is provided. The textured film includes a first layer forming an outer surface and including a fluoropolymer. A second layer includes an encapsulant layer. The first layer and the second layer are mechanically textured to provide a plurality of surface features on the outer surface and extend into the second layer. The film can be applied as a textured film overlying an active component of a photovoltaic device. | 11-08-2012 |
20130043406 | LUMINESCENT COMPOUNDS - A crystalline phosphor of formula: | 02-21-2013 |
20140169037 | MODULE COMPRISING LIGHT-EMITTING DIODES AND LUMINOUS GLAZING WITH SUCH A DIODE-COMPRISING MODULE - A module includes light-emitting diodes, with a printed circuit board bearing light-emitting diodes connected by a series-parallel electrical circuit including a number of circuit branches powered by a common electrical power supply, each branch including two peripheral diodes and optionally at least one internal diode. At least one of the multidiode branches includes at least one reference internal diode, the two diodes closest the reference diode belonging to a branch or branches other than said multidiode branch and/or at least one of the two-diode branches includes two reference peripheral diodes and has, as the closest diode on the printed circuit board, a diode belonging to a branch other than the two-diode branch. | 06-19-2014 |
20150160400 | ILLUMINATING GLAZING WITH INCORPORATED DEFLECTOR - A lighting glazing includes a first sheet of glass of refractive index n | 06-11-2015 |
20150247968 | ILLUMINATED GLAZING WITH PRINTED LAMINATION INSERT - A laminated illuminating glazing unit includes a first sheet with a first main face, a second main face and an edge face, a second sheet with a first main face, a second main face and an edge face; a transparent lamination interlayer making adhesive contact with the second main face of the first sheet and with the first main face of the second sheet; a strip of light-emitting diodes (LEDs), including a printed circuit board and a plurality of LEDs, positioned so that the emitting faces of the LEDs face the edge face of the first sheet; and one or more scattering elements, wherein the lamination interlayer includes, on at least one of its main faces, an opaque masking layer extending from the edge of the interlayer toward the center of the glazing unit so as to cover a zone in which the light from the LEDs would, in the absence of the opaque masking layer, be visible, in the form of luminous halos, through the second sheet. | 09-03-2015 |
Patent application number | Description | Published |
20080208497 | METHOD AND DEVICE FOR CHECKING THE INTEGRITY OF A LOGIC SIGNAL, IN PARTICULAR A CLOCK SIGNAL - A device and a method detect an acceleration of a logic signal expressed by a closure, beyond a closure threshold, of at least two variation edges of the logic signal. A first control bit and a second control bit are provided. At each edge of the logic signal, the value of the first control bit is inverted after a first delay and the value of the second control bit is inverted after a second delay. An acceleration is detected when the two control bits have at the same time their respective initial values or their respective inverted initial values. Application is in particular but not exclusively to the detection of error injections in a secured integrated circuit. | 08-28-2008 |
20080228989 | METHOD AND DEVICE FOR SECURING THE READING OF A MEMORY - A method reads a datum saved in a memory by selecting an address of the memory in which the datum to be read is saved, reading the datum in the memory at the selected address, saving the datum read in a storage space, and when the memory is not being accessed by a CPU, reading the datum in the memory, reading the datum saved in the storage space, and activating an error signal if the datum read in the memory is different from the datum saved. The method can be applied particularly to the protection of smart card integrated circuits. | 09-18-2008 |
20080231325 | METHOD FOR CHECKING THE INTEGRITY OF A CLOCK TREE - A method and device detect synchronization errors between logic signals of a group of logic signals. A control word is loaded into a shift register arranged in loop and clocked by resulting logic signals equal to the result of the OR logic function and to the result of the AND logic function applied to the logic signals of the group of logic signals. The value of the control word is monitored as it propagates in the shift register, and a synchronization error signal is sent if the control word changes value. Application in particular for checking the integrity of a clock tree in an integrated circuit. | 09-25-2008 |
20080294880 | CUSTOMIZATION OF A MICROPROCESSOR AND DATA PROTECTION METHOD - An electronic circuit containing a processing unit for executing program instructions, including at least one unit for recognizing at least one first instruction operator in the program and for converting this first operator into another instruction operator, both operators being interpretable by the processing unit. A method for controlling the access to data by such a circuit. | 11-27-2008 |
20090254782 | METHOD AND DEVICE FOR DETECTING AN ERRONEOUS JUMP DURING PROGRAM EXECUTION - The present disclosure relates to a method for executing, by a processor, a program read in a program memory, comprising steps of: detecting a program memory read address jump; providing prior to a jump address instruction for jumping a program memory read address, an instruction for storing the presence of the jump address instruction; and activating an error signal if an address jump has been detected and if the presence of a jump address instruction has not been stored. The present disclosure also relates to securing integrated circuits. | 10-08-2009 |
20090315603 | DETECTION OF A DISTURBANCE IN THE STATE OF AN ELECTRONIC CIRCUIT FLIP-FLOP - A method and a circuit for detecting a disturbance of a state of at least one first flip-flop from a group of several first flip-flops of an electronic circuit, wherein: the respective outputs of the first flip-flops in the group are, independently from their functional purpose, combined to provide a signal and its inverse, triggering two second flip-flops having data inputs forced to a same state, the respective outputs of the second flip-flops being combined to provide the result of the detection; and a pulse signal comprising a pulse at least for each triggering edge of one of the first flip-flops in the group initializes the second flip-flops. | 12-24-2009 |
20110029828 | FAULT INJECTION DETECTOR IN AN INTEGRATED CIRCUIT - A circuit for detecting a fault injection in an integrated circuit including: at least one logic block for performing a logic function of said integrated circuit; an isolation block coupled to receive a signal to be processed and an isolation enable signal indicating a functional phase and a detection phase of the logic block, the isolation block applying, during the functional phase, the signal to be processed to at least one input of the logic block, and during the detection phase, a constant value to the input of the logic block; and a detection block adapted to monitor, during the detection phase, the state of the output signal of the logic block, and to generate an alert signal in case of any change in the state of the output signal. | 02-03-2011 |
20110126065 | MICROPROCESSOR COMPRISING SIGNATURE MEANS FOR DETECTING AN ATTACK BY ERROR INJECTION - A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing such instruction codes. Current cumulative signatures are produced using deterministic address, control or data logic signals involved in the execution of the sequence and taken off at various points of the integrated circuit. A final cumulative signature is compared with an expected signature and an error signal is produced if the two signatures are not identical. Particularly useful to secure integrated circuits for smart cards. | 05-26-2011 |
20110214012 | SECURED COPROCESSOR COMPRISING AN EVENT DETECTION CIRCUIT - A coprocessor includes a calculation unit for executing at least one command, and a securization device. The securization device includes an error detection circuit for monitoring the execution of the command so as to detect any execution error, putting the coprocessor into an error mode by default as soon as the execution of the command begins, and lifting the error mode at the end of the execution of the command if no error has been detected, an event detection circuit for monitoring the appearance of at least one event to be detected, and a masking circuit for masking the error mode while the event to be detected does not happen, and declaring the error mode to the outside of the coprocessor if the event to be detected happens while the coprocessor is in the error mode. Application in particular but not exclusively to coprocessors embedded in integrated circuits for smart cards. | 09-01-2011 |
Patent application number | Description | Published |
20090307358 | Transmission of Data Between A Server and A Communicating Object - Transmission of data between a download server and a communicating object through a communications network is initiated by a registration server, by transmitting connection parameters received from the download server to the communicating object via a first data channel opened by a first agent of the communicating object after attaching the object to the network. As a function of the connection parameters, a second agent in the communicating object opens a second data channel to the download server so as to transmit the data therein. As long as the first data channel is open, other servers can initiate a transmission via the registration server. | 12-10-2009 |
20110092253 | METHOD FOR ACTIVATING THE SUBSCRIPTION OF AN UICC DEVICE - The invention provides a method for activating the subscription of an UICC, said UICC comprising an activation application, said method comprising the step of activating the subscription of the holder of the UICC by sending a message to an activation server, said message being sent by the activation application to the activation server by using an IP based communication. | 04-21-2011 |
20120117219 | METHOD OF MANAGING AN APPLICATION EMBEDDED IN A SECURED ELECTRONIC TOKEN - The invention is a method of managing an application embedded in a secured electronic token. The token is intended to receive a message from a server machine. The message has a header and a body. The token comprises an agent able to manage the message. The method comprises the steps of:
| 05-10-2012 |
20120190354 | UICCs EMBEDDED IN TERMINALS OR REMOVABLE THERE FROM - The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. | 07-26-2012 |
20130305339 | METHOD OF LOADING DATA INTO A PORTABLE SECURE TOKEN - The invention is a method for loading data into a portable secure token comprising a plurality of security domains. A first security domain comprises a first administration agent and a second security domain comprises a second administration agent. A remote application server comprises a first data to be provided to the second administration agent. A syndication server, which is distinct from the remote application server, contains a list which comprises a reference to the first data. The list is sent in response to a polling request that is sent by the first administration agent. This list is comprised in a polling response which is sent by the syndication server. | 11-14-2013 |
20130329683 | METHOD FOR REMOTELY DELIVERING A FULL SUBSCRIPTION PROFILE TO A UICC OVER IP - The invention proposes a method consisting in: | 12-12-2013 |
20140122872 | METHOD FOR EXPORTING ON A SECURE SERVER DATA COMPRISED ON A UICC COMPRISED IN A TERMINAL - A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC. | 05-01-2014 |
20140141747 | METHOD FOR TRANSMITTING A SIM APPLICATION OF A FIRST TERMINAL TO A SECOND TERMINAL - A method for transmitting a SIM application of a first terminal to a second terminal, the SIM application being stored in a secure element included in the first terminal, with access to the SIM application being locked by a PIN code. The method includes exporting the SIM application from the first terminal to a distant site, by including the PIN code as well as a remote loading code. A user of the second terminal is asked to enter the remote loading code in the second terminal. In the event the remote loading code entered by the user matches the remote loading code that has been exported, the installation of the SIM application in a secure element of the second terminal is authorized. Otherwise, the SIM application is not installed in the secure element of the second terminal. | 05-22-2014 |
20140250501 | SECURE ELEMENT COMPRISING SEPARATED CONTAINERS AND CORRESPONDING METHOD - The invention is a secure element comprising a virtual machine able to work in admin mode and in runtime mode. The secure element comprises two enhanced containers. Each of said enhanced containers can be either in an activated state or in a disabled state. Only one of the enhanced containers can be in activated state at any given time. The virtual machine is adapted to access each of the enhanced containers when working in admin mode. The virtual machine cannot access an enhanced container which is in disabled state when working in runtime mode. | 09-04-2014 |
20150134958 | UICCS EMBEDDED IN TERMINALS OR REMOVABLE THEREFROM - The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. | 05-14-2015 |