Patent application number | Description | Published |
20080268139 | Covert label - A covert label. A substrate comprises a field of ink. Disposed within the field of ink, is ink that can be preferentially removed according to a preconfigured pattern. The preconfigured pattern comprises information associable with at least one object. | 10-30-2008 |
20080304110 | Method for security printing - Method for security printing. A digital model of a feature for printing is received, wherein the feature is for authentication by an external device. Deviation from the digital model is compensated for, to a printed instance of the feature. | 12-11-2008 |
20080310715 | APPLYING A SEGMENTATION ENGINE TO DIFFERENT MAPPINGS OF A DIGITAL IMAGE - An image processing method includes applying a segmentation engine to different mappings of a digital image, and using the different segmented mappings to identify segments in the digital image. | 12-18-2008 |
20090141892 | SECURITY PRINTING METHOD AND SYSTEM FOR ENHANCING SECURITY PRINTING - A security printing method includes generating a security file having a plurality of metadata fields and an information field concatenated together in an initial sequence. A security file identification is generated from the plurality of metadata fields and the information field. The security file identification corresponds to the initial sequence and is a one-way function of the plurality of metadata fields and the information field. The method further includes selecting a custom scrambling technique based on the security file identification, and scrambling the initial sequence using the selected custom scrambling technique, thereby creating a scrambled sequence of the plurality of metadata field and the information field. | 06-04-2009 |
20090144799 | METHOD AND SYSTEM FOR SECURELY TRANSMITTING DETERRENT DATA - A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data therein, and transmitting a portion of the deterrent data from a subset of the glyphs without transmitting deterrent data from a remainder of the glyphs. The glyphs form a predetermined structure with a single solution. The method further includes receiving the portion of the deterrent data, placing the portion of the deterrent data into the subset of the glyphs, and solving the predetermined structure with the single solution, thereby determining the remainder of the glyphs to be infilled in the predetermined structure with deterrent data gleaned from the solution. | 06-04-2009 |
20090310874 | DECODING INFORMATION FROM A CAPTURED IMAGE - A method for decoding information from a captured image is disclosed. The captured image has a plurality of color patches including a plurality of payload patches, a plurality of calibration patches, and an orientation patch. The orientation patch has a unique characteristic with respect to the payload patches and the calibration patches. The method includes identifying, within the captured image, the color patch having the unique characteristic as the orientation patch. The plurality of calibration patches are identified within the captured image. Each of the calibration patches has a unique predetermined location with respect to the identified orientation patch. A relative orientation of the image is determined based on a location of the identified orientation patch within the captured image. Calibration information is discerned according to characteristics of the identified calibration patches. The relative orientation and the calibration information are utilized to decode the information from the payload patches in the captured image. | 12-17-2009 |
20100052308 | ANTI-COUNTERFEIT PACKAGING - Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a random mark; and an electronic memory element containing data about the random mark, the memory element being attached to or integrated with the product or packaging for the product in a tamper evident manner. | 03-04-2010 |
20100188512 | METHOD AND SYSTEM FOR TESTING IMAGE PIPELINES - A method for testing image pipelines includes transforming an untransformed captured image multiple times using a plurality of pipelines, thereby generating a plurality of transformed images, and comparing a functional set of metrics associated with each of the plurality of transformed images with a functional set of metrics associated with each image in a ground truth set. From the comparison, a determination is made as to which of the plurality of pipelines generates a transformed image that is functionally closest to an image in the ground truth set. | 07-29-2010 |
20100188709 | VARIABLE DATA ADDITION METHOD AND SYSTEM - A variable data addition method and system are disclosed herein. The method includes generating an original image, and defining at least one sub-section of the original image to transform individually. A reversible transformation is applied to the defined at least one sub-section, thereby altering the original image to form an altered image that is non-readable until an inverse of the reversible transformation is applied to the altered image. | 07-29-2010 |
20100225937 | IMAGED PAGE WARP CORRECTION - A method of correcting warp on an imaged page includes generating projection profiles for pixels on the imaged page and determining a reference baseline based on the projection profiles; calculating a deviation away from the reference baseline for points along a boundary; and mapping the points along the boundary to the reference baseline. | 09-09-2010 |
20110063654 | SYSTEM AND METHOD OF SORTING PRINT JOBS - The present disclosure is directed to method and systems of sorting print jobs for assignment to a plurality of printers having different printing characteristics. Print jobs can be received, sorted based on the print parameters of the print jobs, combined into print job groupings based on printing prioritizations, and sent to a plurality of printers having printing configurations that achieve the print parameters and the printing prioritizations. | 03-17-2011 |
20110068181 | Multi-modal Security Deterrents And Methods For Generating The Same - Various multi-modal security deterrents ( | 03-24-2011 |
20110069328 | SYSTEM AND METHOD FOR CREATING A DATA-BEARING IMAGE - A system for creating a data-bearing image can include a reference image generator configured to apply a clustered-dot halftone screen to a continuous-tone image. The resulting reference halftone image includes carrier cells in which a pixel cluster can be shifted to at least two shift positions in the carrier cell. The system also includes a payload encoder configured to segment the data payload and encode data segments into one of the carrier cells by shifting the cluster to one of the shift positions. The system also includes an output device configured to output the resulting data-bearing halftone image. | 03-24-2011 |
20110073655 | Blur Resistant Barcode - A blur resistant barcode is disclosed. The blur resistant barcode comprise a plurality of parallel lines and spaces where information is encoded in the barcode by variations in the thicknesses of the plurality of parallel lines and by variations in the spacing between the plurality of parallel lines. The blur resistant barcode has at least one blur resistant feature that has a thickness in an axis of motion greater than a maximum thickness of any one of the plurality of parallel lines. The axis of motion is perpendicular to the plurality of parallel lines. | 03-31-2011 |
20110116681 | Security Printing Analysis System And Method For Enhancing Security Printing - A method for enhancing security printing includes generating data for a region of interest ( | 05-19-2011 |
20110170145 | Secure Document Creation with a Multi-Function Apparatus - In a method of creating a secure document with a multi-function apparatus, identity information of a user is obtained. The identity information is converted into a security feature, which is created to enable the user's identity information to be retrievable directly from the security feature. In addition, the security feature is printed onto the document with the multi-function apparatus. | 07-14-2011 |
20110194152 | ENHANCED SECURITY PRINTING OF A LAYOUT TEMPLATE - A method for enhancing security printing of a layout template is disclosed. The method includes receiving the layout template, and acknowledging one or more constraints for the layout template. At least one unconstrained layout element of the layout template is varied, thereby generating a varied layout template. The varied layout template is printed and scanned. The method further includes determining a number of bits that can be encoded in the varied layout template, where the number of bits depends on the varying of the at least one unconstrained layout element. | 08-11-2011 |
20110209214 | METHOD AND SYSTEM FOR PROVIDING RECORDING DEVICE PRIVILEGES THROUGH BIOMETRIC ASSESSMENT - A method and system for providing recording device privileges through biometric assessment are disclosed herein. An embodiment of the method includes monitoring information associated with a recording device. The information includes a recording device location, dynamic biometric data, knowledge data, and recording device identification data. From the monitored information, an identity of a then-current user of the recording device is determined. An authorization level for the then-current user is determined, and recording device access privileges are dynamically adjusted based on the determined authorization level. | 08-25-2011 |
20110261376 | Method For Enhancing Security Printing - A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a physical security data stream is generated from the physical security information. The physical security data stream is mapped to a data stream that is used to provide settings for the fields for the print job variability. The fields for the print job variability are set based upon the mapping the physical security data stream. | 10-27-2011 |
20110280480 | SYSTEM AND METHOD FOR ENHANCING SECURITY PRINTING - A system for enhancing security printing includes a segmentation system, a secure database in operative communication with the segmentation system, a secure registry in selective operative communication with the segmentation system, and an analysis system in operative communication with the segmentation system and the secure database, and in selective operative communication with the secure registry. The segmentation system performs zoning analysis on a scanned image to identifying a list of regions in the image. The secure database stores at least one of i) a template, or ii) prior zoning output specification. The secure registry stores region of interest information and information pertaining to strategies for identifying a region of interest. The analysis system identifies the region of interest utilizing at least one of the secure database or the secure registry. | 11-17-2011 |
20110310404 | VOID PANTOGRAPHS AND METHODS FOR GENERATING THE SAME - A void pantograph and a method for generating the same are disclosed herein. The void pantograph includes a foreground portion based on a region of an image that is defined using a predetermined filter, and a background portion based on another region of the image that is defined using the predetermined filter. | 12-22-2011 |
20110310441 | METHOD FOR USING VOID PANTOGRAPHS - A method for using void pantographs involves generating a test sheet including multiple void pantographs, where each of the multiple void pantographs includes a pantograph foreground and a pantograph background. The test sheet is printed, and from the printed test sheet, at least one of the multiple void pantographs having a covert or semi-covert pantograph foreground and background is identified. The printed test sheet is scanned, and from the scanned test sheet, at least one of the multiple void pantographs having an overt pantograph foreground is identified. A workflow is developed for the at least one of the multiple void pantographs having both i) the covert or semi-covert pantograph foreground and background after printing, and ii) the overt pantograph foreground after scanning. | 12-22-2011 |
20120012657 | DECODING A PHYSICAL IMAGE - A method for decoding information from a physical image having a plurality of payload patches includes generating a digital representation of the physical image. A plurality of regions are mapped to the plurality of payload patches in the digital representation. A scramble pattern is identified and the plurality of mapped regions of the digital representation are reordered according to the identified scramble pattern. Information is decoded from the payload patches of the reordered plurality of mapped regions. | 01-19-2012 |
20120013447 | SYSTEM FOR RECOVERING DATA FROM AN UNREADABLE TAG - A system includes a population of items each including a tag, each tag including a plurality of identification bits and a plurality of redundancy bits, and a tag reader configured to read tags and determine the identification bits of at least one unreadable tag in the population based on the identification bits and the redundancy bits of at least one readable tag in the population. | 01-19-2012 |
20120014604 | Blur Estimation - A method and apparatus for removing blur in an image is disclosed. The blur in the image is caused by relative motion between the imaging device and the object being imaged. A set of differences between the pixel values in the image is calculated. The set of differences in pixel values are divided into two groups, wherein the first group of differences in pixel values corresponds to differences in pixel values due to noise, and the second group of differences in pixel values corresponds to differences in pixel values due to noise and motion. An estimate of the motion blur is determined using the second group of differences in pixel values. The estimate of the blur is then used to remove the blur from an image. | 01-19-2012 |
20120019879 | COLOR TARGET AUTHENTICATED USING GRAYSCALE INFORMATION - A color target is disclosed. The color target comprises a plurality of marks or features. Each of the plurality of marks can be one of a plurality of colors. Each of the plurality of colors has a corresponding grayscale value that is spaced apart by a predetermined amount. | 01-26-2012 |
20120070030 | PAYLOAD RECOVERY SYSTEMS AND METHODS - A payload recovery system includes a reference halftone image of a data-bearing halftone image and a reference map of the data-bearing halftone image. The system further includes a cell alignment system for receiving a scanned image of a hard copy of the data-bearing halftone image and for generating an aligned scan of the scanned image using the reference halftone image and the reference map. A raw payload recovery system determines possible shift positions of each carrier cell of the aligned scan using a shift rule and the reference map; and a reconstructed data-bearing halftone image is generated by the raw payload recovery system using the possible shift positions and the reference halftone. The system also includes a recovered raw payload generated by the raw payload recovery system using the shift rule and the reference map. | 03-22-2012 |
20120070040 | Automated Inspection Of A Printed Image - Automated inspection method for detecting a defect in a printed image, comprising processing a raster image, sending the raster image to a print process, printing a printed image corresponding to the raster image onto a medium, capturing a target image from at least a part of the printed image at a lower resolution than the printed image, at least in a medium moving direction, converting at least a part of the raster image to a reference image, and comparing the reference image to the target image. | 03-22-2012 |
20120109977 | KEYWORD DETERMINATION BASED ON A WEIGHT OF MEANINGFULNESS - Example embodiments relate to keyword determination based on a weight of meaningfulness. In example embodiments, a computing device may determine a number of occurrences of a word in a particular document and may then determine a weight of meaningfulness for the word based on the number of occurrences. The computing device may then add the word to a set of keywords for the document based on the weight of meaningfulness. | 05-03-2012 |
20120114170 | COUNTERFEIT DETECTION SYSTEM - A counterfeit detection system is disclosed herein. The system includes an image reduction system for minimizing size of at least one original image using a plurality of different reduction strategies to generate a plurality of minimized images. The system further includes a classification system which includes a first sub-system for generating at least one accuracy comparative assessment metric for each of the plurality of minimized images, a second sub-system for comparing the at least one accuracy comparative assessment metric for each of the plurality of minimized images with an accuracy assessment metric for the at least one original image, and a third sub-system for determining if at least one of the plurality of minimized images can be transmitted with improved or equivalent classification accuracy at a reduced bandwidth when compared to the original image are also part of the system. | 05-10-2012 |
20120131351 | MANAGING ACCESS TO A SECURE DIGITAL DOCUMENT - In a method for managing access to a secure digital document by workflow participants, in which a respective public key is associated with each of the workflow participants, an entry table is populated with a participant entry for each of the workflow participants. Each of the participant entries includes a map entry identifier that corresponds to a map entry tag in a map file, and a first label associated with the map entry identifier. In addition, symmetric keys for the workflow participants are accessed and each of the first labels is encrypted using a respective symmetric key to generate a plurality of second labels, the entry table is populated with the plurality of second labels, each of the plurality of symmetric keys is encrypted with the public key of a respective workflow participant, and the entry table is incorporated into the digital document. | 05-24-2012 |
20120154866 | SYSTEM AND METHOD OF SORTING PRINT JOBS FOR A PLURALITY OF PRINT SERVICE PROVIDERS - The present disclosure is directed systems and methods of sorting print jobs for assignment to a plurality of print service providers. In one aspect, such a method can include receiving at a print server a plurality of print jobs having a plurality of print parameters from a plurality of users, where individual print jobs have multiple print parameters being represented in a portion of the plurality of print jobs. The method can further include selecting a prioritization factor, identifying a plurality of print service providers having at least partially different printing configurations, sorting the plurality of print jobs into a plurality of print job groupings based on common printing parameters and the prioritization factor, and sending the plurality of print job groupings to the plurality of print service providers to achieve the common print parameters and the prioritization factor. | 06-21-2012 |
20120185701 | DOCUMENT SECURITY SYSTEM AND METHOD - A method and system for document security are described. The method decrypts a key-map file located a composite document with embedded access control, decrypts a content part from the composite document with embedded access control, wherein the key-map file provides a key to access the content part, loads the content part in decrypted form into a document serialization maintained in a transient memory where the content part in decrypted form is maintained exclusively in the transient memory, and erases the content part in decrypted form upon termination of a program to access the decrypted content part from the document serialization. | 07-19-2012 |
20120185759 | SYSTEM AND METHOD FOR COLLABORATIVELY EDITING A COMPOSITE DOCUMENT - A method and system for collaboratively editing a composite document having a plurality of original document parts. For each of one or more original document parts, a non-editable version of the original document part may be stored. Edits to the original document part may be stored in a plurality of edit parts. Each of the plurality of edit parts may be editable by a single associated one of a plurality of users and may be non-editable by all other users of the plurality of users. The plurality of edit parts may be individually encrypted and the edit parts may be stored separately from the original document parts. | 07-19-2012 |
20120191983 | MANAGING INFORMATION IN A DOCUMENT SERIALIZATION - In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of the atomic unit reference name in the document serialization are replaced with the new name for the atomic unit to conceal the atomic unit reference name. In addition, a map file containing a map file entry for each of a plurality of workflow participants is generated, in which each of the map file entries includes the new name and an access key to access the atomic unit. | 07-26-2012 |
20120198237 | DOCUMENT MANAGEMENT SYSTEM AND METHOD - A document management system includes a number generator and/or a secure controller, and a document. The document includes a map-file for each participant in a workflow of the document. Corresponding, randomly generated nonces and/or complementary workflow assurance tokens are distributed within the respective map-files of neighboring participants by the number generator or the secure controller. The system includes a private key that recovers the respective corresponding, randomly generated nonce of a receiving one of the neighboring participants and/or the respective complementary workflow assurance token of the receiving one of the neighboring participants. A communication mechanism enables transmission of the recovered corresponding, randomly generated nonce of the receiving one of the neighboring participants or a signature generated by the receiving one of the neighboring participants to a sending one of the neighboring participants for verification. | 08-02-2012 |
20120212324 | METHOD AND SYSTEM FOR MODEL-BASED SIGNATURE PROFILE EXTRACTION - A method for model-based signature profile extraction includes capturing an image of an authentic glyph. An outline model is fit to the image of the authentic glyph, and an authentic signature profile is extracted based on the outline model. A signature profile extracted from an image of another glyph may be compared to the to the authentic signature profile so as to forensically verify authenticity of the other glyph The system for model-based signature profile extraction includes a controller, a capture unit, an outline unit, a profiling unit, and a forensic verification unit. A computer readable medium containing executable instructions is also described. | 08-23-2012 |
20120233110 | Determining Probability Than An Object Belongs To A Topic Using Sample Items Selected From Object And Probability Distribution Profile Of The Topic - An object potentially belongs to a number of topics. Each topic is characterized by a probability distribution profile of a number of representative items that belong to the topic. Sample items are selected from the object, less than a total number of items of the object. A probability that the object belongs to each topic is determined using the probability distribution profile characterizing each topic and the sample items selected from the object. | 09-13-2012 |
20120239714 | DOCUMENT MANAGEMENT SYSTEM AND METHOD - A document management system includes a document. One or more of a plurality of map-files of the document correspond(s) with a step of a multi-step workflow associated with the document. A random nonce is generated for each of the steps of the multi-step workflow except for an initial step of the multi-step workflow. Each of the random nonces i) is incorporated as a map-file entry into a respective one of the plurality of map-files corresponding with a step of the multi-step workflow that directly precedes the step of the multi-step workflow for which the random nonce is generated and ii) is used to perform a nonce-based initiating operation a respective one of the plurality of map-files corresponding with the step of the multi-step workflow for which the random nonce is generated. | 09-20-2012 |
20120248193 | Blur Resistant Barcode - A blur resistant barcode is disclosed. The blur resistant barcode comprise a plurality of parallel lines and spaces where information is encoded in the barcode by variations in the thicknesses of the plurality of parallel lines and by variations in the spacing between the plurality of parallel lines. The blur resistant barcode has at least one blur resistant feature that has a thickness in an axis of motion greater than a maximum thickness of any one of the plurality of parallel lines. The axis of motion is perpendicular to the plurality of parallel lines. | 10-04-2012 |
20120260096 | METHOD AND SYSTEM FOR MONITORING A SECURE DOCUMENT - A method for enabling access to a secure document by a document service includes receiving the document, and an ordered sequence of signature verification keys that are to be selected in an orderly manner, from a document owner. Access is enabled to the document via an allocated access address. Uploading an uploaded document is enabled. A signature associated with the uploaded document is verified using a currently selected signature verification key from the ordered sequence. If verification fails, the uploaded document is rejected. If verification succeeds, the document accessible via the allocated access address is replaced with the uploaded document and a next signature verification key of the ordered sequence is selected to be the currently selected signature verification key. | 10-11-2012 |
20120263343 | FORENSIC MARKING IDENTIFYING OBJECTS - An image is obtained of an identifying object that is on a printed document. A forensic signature is extracted from the image. Access to the extracted forensic signature profile is enabled via information encoded in the identifying object. The identifying object may be interpreted to access the forensic signature for comparison with another. | 10-18-2012 |
20120269427 | PRINTED INFORMATION DEVICE - A printed information device includes a region of interest in an image, and at least two channels assigned to the region of interest by different means of logical partitioning. The region of interest represents a physical area of the image. Each of the channels has a different error tolerance. Continuous and/or cyclic information is independently encoded in each of the at least two channels. The deterrent is configured to be read substantially simultaneously by at least two distinct reading strategies. | 10-25-2012 |
20120278631 | DOCUMENT MANAGEMENT SYSTEM AND METHOD - A document management system and method are disclosed herein. An example of the document management system includes a composite document generation module that generates a composite document and a secret seed that is associated with an owner or initiator of the composite document, and a key derivation module that derives, from the secret seed and using a key derivation function, at least one of a key for encryption, a key for decryption, a key for signature, or a key for verification for a participant of a workflow associated with the composite document. | 11-01-2012 |
20120280029 | INCREMENTAL INFORMATION OBJECT WITH AN EMBEDDED INFORMATION REGION - Systems and methods for generating an incremental information object with an embedded information region (IIOEIR) are provided. A method includes analyzing an IIOEIR to determine a first code, wherein the IIOEIR includes a plurality of tiles, and wherein a first set of the plurality of tiles includes a first code and a second set of the plurality of tiles includes a second code. The first code is confirmed, and, if the confirmation succeeds, generating a new code comprising a bitstream, overwriting the bitstream onto the first region. A new second code is generated, wherein the new second code is related to the first code, and the new second code is overwritten onto a second region. | 11-08-2012 |
20120281920 | PARALLEL TEST PAYLOAD - A parallel test payload includes a bit sequence configured to be segmented into a plurality of sub-sequences having variable bit length carriers. Respective carriers are represented uniformly in each one of the plurality of sub-sequences. | 11-08-2012 |
20120286028 | ADAPTING AN INCREMENTAL INFORMATION OBJECT - Systems and methods for adapting an incremental information object (IIO) to accommodate a change in a workflow are provided. A method includes analyzing an IIO, wherein the IIO comprises a plurality of tiles, and wherein the plurality of tiles comprise a code. The code is confirmed and, if the confirmation is successful, a determination is made as to whether the workflow has changed. If the workflow has changed the IIO is modified to change the information density of the IIO, a new code comprising a bitstream is generated, and the bitstream is overwritten on the plurality of tiles. | 11-15-2012 |
20120290849 | MANAGING SEQUENTIAL ACCESS TO SECURE CONTENT USING AN ENCRYPTED WRAP - In a method for managing sequential access to secure content by a plurality of workflow participants, a key-map file for each of the participants is created. Each of the key-map files contains a subset of encryption and signature keys for the content. The key-map files are sorted in an order that is the reverse of a workflow order in which the workflow participants for which the key-map files were created are to access the secure content. An encrypted later wrap including a later key-map file for a later workflow participant along the workflow order and an encrypted first wrap including a prior key-map file for a prior workflow participant and the encrypted later wrap are created. In addition, the first wrap is incorporated into a document serialization for the content. | 11-15-2012 |
20120303968 | METHOD AND SYSTEM FOR BUSINESS WORKFLOW CYCLE OF A COMPOSITE DOCUMENT - A method and system for a business workflow of a composite document are described. An integrity and authenticity of an entry table are identified and verified using a verification key, a map file corresponding to entries in the table are identified using a private user decryption key, signature verification keys and access keys are read from the map file, and authenticity of the map file and the document parts are verified. Following verification, content is delivered to a user for review, update and/or modification of the content, and then is encrypted, signed, and moved along the workflow, normally to the next workflow participant. A secure distribution version of a composite document is created from a master copy by creating a serialization including at least one part of a composite document and at least one user, creating a table listing document parts and associated users, generating encryption and decryption keys, encrypting document parts, applying signatures to encrypted document parts, updating the tables with the signed parts and updating the composite document with the updated tables. A master copy is updated from a secure distribution copy after the distribution copy has completed a workflow and a workflow wrap. | 11-29-2012 |
20130028538 | METHOD AND SYSTEM FOR IMAGE UPSCALING - An embodiment provides a method for image upscaling. The method includes anti-aliasing an input image and downsampling the input image to create a lower resolution image. The method also includes interpolating the lower resolution image to obtain a higher resolution image and creating a filter map from the input image and the higher resolution image. The method also includes upsampling the input image using the filter map to create a high-resolution image. | 01-31-2013 |
20130031366 | MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD FOLLOWING INTRODUCTION OF THE PPCD INTO A WORKFLOW - In a method for managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow among a plurality of workflow participants, in a secure content manager, from a workflow participant of the plurality of workflow participants, a key-map file for a subsequent workflow participant that is to receive the key-map file is received, wherein the key-map file comprises a set of keys to enable the subsequent workflow participant to access the content-part in the PPCD. In addition, authenticity of the received key-map file is verified, the subsequent workflow participant to receive the PPCD is identified and authenticated, a public key of the subsequent workflow participant is accessed, the key map file or a symmetric key used to encrypt the key-map file prior to receipt of the key-map file by the secure content manager is encrypted using the public key of the subsequent workflow participant, and the encrypted key-map file is sent to the subsequent workflow participant. | 01-31-2013 |
20130031369 | MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD USING A KEY RESET POINT - In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map files comprising subsets of access keys that provide access to the secure content-part during respective content access sessions are generated, in which at least one of the key-map files corresponds to the key reset point and comprises a first decryption key, a first verification key, a second encryption key, and a second signature key, in which the first decryption key does not correspond to the second encryption key, and in which the first verification key does not correspond to the second signature key. In addition, the plurality of key-map files are supplied to at least one of the participants. | 01-31-2013 |
20130036127 | DOCUMENT REGISTRY SYSTEM - A document registry system ( | 02-07-2013 |
20130041866 | Information Tracking System and Method - An information tracking system ( | 02-14-2013 |
20130041899 | Information Tracking System and Method - An information tracking system includes a plurality of sources (S | 02-14-2013 |
20130104190 | SYSTEM AND METHOD FOR DOCUMENT POLICY ENFORCEMENT - A system and method is disclosed for document policy enforcement. The method discloses: scanning document parts for a set of policy-eliciting terms | 04-25-2013 |
20130105587 | RFID ANTENNA AND 2D BARCODE | 05-02-2013 |
20130111544 | MANAGEMENT OF CONTEXT-AWARE POLICIES | 05-02-2013 |
20130114113 | Method and System for Generating a Document Having a Layered Void Pantograph - A method and system for generating a document having a void pantograph highlight pattern is presented. The method includes computing a score for a void pantograph highlight pattern layer in relation to a document formatted content layer, incrementing a relative position of the void pantograph highlight pattern layer and the document formatted content layer, repeating the computing and the incrementing steps to obtain a plurality of scores at a plurality of relative positions, evaluating the plurality of scores to determine an optimal alignment, and printing the document using variable-data printing techniques, wherein the printed document has a multi-layer architecture including the document formatted content layer and the void pantograph highlight pattern layer. The system includes a control processor, a score computation unit and an evaluation unit. The control processor provides a printer with data containing a multi-layer architecture document having a document formatted content and a void pantograph highlight pattern. | 05-09-2013 |
20130124456 | MANAGING DOCUMENT WORKFLOW - Methods and apparatus for managing document workflow, including generating a nonce for providing participant access for a particular step of the document workflow, generating a first number of nonce elements, and assigning nonce elements to a plurality of participants of a step of the document workflow preceding the particular step in a one-to-one correspondence. The nonce is determinate from a number of the nonce elements that is greater than or equal to a second number and less than or equal to the first number. | 05-16-2013 |
20130124567 | AUTOMATIC PRIORITIZATION OF POLICIES - Input is obtained to modify one of a set of self-consistent and prioritized document policies, each policy indicating an allowability of a requested action when a condition of the policy is satisfied. Each policy is representable by a node on a multipartite graph, the node being located in a part of the multipartite graph that corresponds to the allowability indicated by the policy. Two nodes are connectable by an edge that indicates a relative priority between their corresponding policies. A transitive closure of the representation is computed so as to identify paths of contiguous edges that connect pairs of nodes. When two policies with different allowabilities are applicable to a single requested action on a single document, and when the corresponding nodes are connected by one of the identified paths, a relative priority is automatically assigned to the two policies as indicated by the path. | 05-16-2013 |
20130193216 | System for Generating an Incrementally Completed 2D Security Mark | 08-01-2013 |
20130193217 | System for Generating an Incrementally Completed 3D Security Mark | 08-01-2013 |
20130193218 | System for Generating an Incrementally Completed Security Mark | 08-01-2013 |
20130198255 | WORKFLOW TERMINATION DETECTION AND WORKFLOW RECOVERY - Detecting a workflow termination. An object with embedded access control is sent to a next participant in a workflow, wherein the embedded access control is provided and enforced by placing a subset of access keys for individual content-parts into a unique key-map entry for each participant, wherein the object is a Publicly Posted Composite Document. A workflow termination is detected after failure to receive a confirmation token from the next participant after a specified condition is not met. | 08-01-2013 |
20130198524 | OBJECT WITH IDENTITY BASED ENCRYPTION - A workflow order is created for the object. Public parameters are received from a key generation center at a computer associated with an object master. A public key is generated at the computer system based on a user identifier and the public parameters, wherein the user identifier is comprised of user related information. The object is encrypted using the public key such that the object cannot be opened without the a private key, wherein the object is a composite document comprising multiple elements of documents of different formats, and wherein the private key is generated in response to a request from an authenticated user using the user identifier at the key generation center. Access to the multiple elements of the object is controlled based on workflow order. | 08-01-2013 |
20130219453 | DATA LEAK PREVENTION FROM A DEVICE WITH AN OPERATING SYSTEM - A data leak from a computer can be prevented by intercepting one or more system calls from an unknown application and applying different policies to the intercepted action associated with the system call(s) depending on the data itself and the metadata of a document associated with the system call. | 08-22-2013 |
20130246799 | Providing Differential Access to a Digital Document - In a method for providing differential access to a digital document among workflow participants, in which at least one of the workflow participants is outside of a common secure environment ( | 09-19-2013 |
20130251191 | Method and System for Determining Void Pantograph Settings - A method and system for determining void pantograph settings is presented. The method includes obtaining electronic images of one or more predefined test sheets having a plurality of void pantograph settings, modeling one or more regions of the electronic images, predicting the sensitivity of the plurality of void pantograph settings to a print/scan process, the predicting being based at least in part on the one or modeled regions, and identifying characteristics for a candidate void pantograph setting using the prediction step results. The system includes a controller, a modeling unit, a measuring unit and a prediction unit configured to perform a method in accordance with an embodiment of the invention. A computer readable medium containing executable instructions is also described. | 09-26-2013 |
20130290715 | TRANSMITTING A DOCUMENT - A method of transmitting a document from a computing device to a printing device using a document server comprising, at the server, receiving user credentials from a user of an authorized computing device, receiving encrypted data defining the document from the authorized computing device, receiving information indicating the intended recipients of the data, receiving user credentials from an authorized printing device, and delivering the encrypted data to an authorized recipient. | 10-31-2013 |
20130290963 | Workflow-Enhancing Device, System and Method - Systems and methods for performing task execution in a workflow are described. The system comprises at least one modular device ( | 10-31-2013 |
20130291051 | SYSTEM CALL INTERCEPTION - System call interception is activated for an application process. It is recorded that system call interception is active for the application process. Ongoing checking is performed to determine whether system call interception remains active. | 10-31-2013 |
20130301913 | SELECTING METRICS FOR SUBSTRATE CLASSIFICATION - Methods for selecting metrics for substrate classification, and apparatus to perform such methods. The methods include determining a value of a metric from an image of a substrate sample for each substrate sample of a plurality of substrate samples, wherein the metric is indicative of a surface texture of each substrate sample and iteratively assigning substrate samples of the plurality of substrate samples to an aggregate of a particular number of aggregates in response to a value of the metric for each substrate sample until a convergence of clustering is deemed achieved, then determining an indication of cluster tightness of the particular number of aggregates. The methods further include selecting or ignoring the metric for substrate classification in response to the indication of cluster tightness of the particular number of aggregates. | 11-14-2013 |
20140023191 | Mass Serialization Analytics - A method of determining whether a mass serialization engine is cryptographically secure is provided herein. The method includes performing ( | 01-23-2014 |
20140027515 | Grayscale Incremental Information Object - Systems and methods for generating a grayscale incremental information object (IIO) are provided. A method includes analyzing a grayscale IIO to determine a first code, wherein the grayscale IIO comprises a plurality of tiles, and the intensity of a tile corresponds to the number of data bits written to the tile. The product is confirmed from the first code, and, if the product is confirmed a new code comprising a bitstream is generated. The bitstream is overwritten on the grayscale IIO. The grayscale IIO is the same size after writing of the bitstream. | 01-30-2014 |
20140036283 | SOFT PROOFING SYSTEM - A soft proof system includes a display module and a manager. The display module displays a visual representation of a print product, and a color array expressing a tolerance range of a color component of the visual representation and a target color within the range. Via the manager, a visualization function produces the visual representation and the color array according to a soft proof array. A tolerance selection function, associated with the display module, enables selection of the tolerance range for at least a portion of the print product, wherein the selection is expressed on the display in the visual representation and in the color array. | 02-06-2014 |
20140042228 | Dual Deterent Incremental Information Object - Systems and methods for generating a dual deterrent information object (IIO) are provided. A method includes analyzing a dual deterrent IIO to determine a first code, wherein the dual deterrent IIO comprises an IIO comprising a plurality of tiles and an associated mark, wherein each tile in the plurality of tiles represents a data element encoded by color, intensity, or both, and the associated mark comprises information related to the IIO. The first code is confirmed, and, if the first code passes the confirmation a new code comprising a bitstream is generated. The bitstream is overwritten on the plurality of tiles, wherein the dual deterrent IIO is the same size after writing of the bitstream. A new associated mark related to the dual deterrent IIO is generated and the associated mark is overwritten with the new associated mark. | 02-13-2014 |
20140082095 | WORKFLOW MONITORING - Systems, computer readable media, and methods for workflow monitoring of documents are provided. An example of a workflow monitoring system includes a document having a map-file for each participant in a workflow of the document and a first communication mechanism to transmit the document to a receiving participant in the workflow. The system includes an application, associated with a receiving device of the receiving participant, to extract a confirmation token from the map-file and transmit the confirmation token and a second communication mechanism, different from the first communication mechanism, to transmit a direct message including at least the confirmation token to verify receipt of the document by the receiving participant. | 03-20-2014 |
20140090053 | Internet Protocol Address Distribution Summary - Examples disclosed herein relate to an Internet Protocol address distribution summary. A processor may determine a statistical distribution between at least one portion of bits of Internet Protocol addresses accessing a website and determine a summary value representative of the degree of change within the statistical distribution. The processor may output the summary value. | 03-27-2014 |
20140146882 | Method and System for Compression of a Real-Time Surveillance Signal - An embodiment provides a method for compression of a real-time surveillance signal. This method includes receiving a signal from a monitoring device and analyzing the signal to be monitored to compute spectral content of the signal. This method also includes computing the information content of the signal and determining a count of a number of coefficients to be used to monitor the signal. This method includes deploying a strategy for computing a plurality of coefficients based on the spectral content of the signal and the count of the number of coefficients to be used for monitoring the signal. This method further includes monitoring the signal and resetting the system in the case of above-threshold changes in a selected portion of the plurality of coefficients. | 05-29-2014 |
20140149106 | Categorization Based on Word Distance - Examples disclosed herein relate to categorizing a target word based on word distance. A processor may determine a difference level threshold for a category based on difference levels between words associated with the category and determine difference levels between a target word and the words associated with the category. If one of the difference levels of the target word is below the threshold associated with the category, the processor outputs the category. | 05-29-2014 |
20140185943 | Distance-Based Image Analysis - An image analyzer ( | 07-03-2014 |
20140191027 | Generating an Incremental Information Object - Systems and methods for generating an incremental information object (IIO) from an information object (IO). The method includes analyzing an IO to identify code, wherein the IO is made up of a number of tiles, and wherein the tiles make up a code. The method also includes confirming the code. If the code is successfully confirmed, the method further includes modifying the IO by adding binary information to the IO through the use of color scales that are not recognizable by an optical IO reader, generating a new progressive code comprising a bitstream, and overwriting the bitstream on the tiles. | 07-10-2014 |
20140231510 | Tracking Customer Loyalty Information Using an Incremental Information Object - A method for tracking customer loyalty information using an incremental information object (IIO) includes capturing an information object (IO), wherein the IO include a number of tiles, and wherein the number of tiles include a standard code. The method also includes analyzing the IO to identify the standard code and analyzing the IO to determine if the IO is an IIO containing a progressive code, wherein the progressive code does not interfere with the reading of the standard. The method further include confirming the progressive code and, if the progressive code is successfully confirmed, obtaining customer loyalty data from the progressive code within the IIO. | 08-21-2014 |
20140241618 | Combining Region Based Image Classifiers - Examples disclosed herein relate to combining region based image classifiers. In one implementation, a processor measures correct classification and misclassification levels associated with a first image classifier related to a first image feature region and measures correct classification and misclassification levels associated with a second image classifier related to a second image feature region. The processor may create a combined classifier based on the first image classifier correct classification and misclassification levels and based on the second image classifier correct classification and misclassification levels such that the combined classifier is related to the first image feature region and the second image feature region. | 08-28-2014 |
20140289260 | Keyword Determination - Examples disclosed herein relate to keyword determination. In one implementation, a processor determines a summary of a text and identifies a keyword related to the text based on a comparison of the summary of the text to the remaining portion of the text. The processor may output the identified keyword. | 09-25-2014 |
20140333969 | Printer Sample Feature Set - A system can comprise a memory to store machine readable instructions and a processing unit to access the memory and execute the machine readable instructions. The machine readable instructions can comprise a feature set extractor to extract a feature set from each of a plurality of digital images of print samples. The feature set can be a filtered feature set that includes a feature set characterizing a printer that printed a given print sample of the print samples. The machine readable instructions can also comprise a cluster component to determine clusters of the print samples based on the feature set of each of the plurality of scanned images of the print samples. The machine readable instructions can further comprise a printer identifier to identify the printer of the print samples based on the clusters of the print samples. | 11-13-2014 |
20140334723 | Identification Mark with a Predetermined Color Difference - An identification mark may have a calibration color, a predetermined authentication color, and a predetermined difference between the calibration color and the predetermined authentication color that is associated with a product; and a visual code with a mechanism that identifies the predetermined difference. | 11-13-2014 |
20140339312 | Progressive Barcode - A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of blocks in a progressive barcode. The method and apparatus including, encoding information of a first data element within the matrix using black modules and, encoding information of a second data element within the matrix using color modules. The barcode being configured to be overprinted as it progresses through progressive states. The progressive barcode, resulting from the overprinting through the progressive states, masking the ability to conclusively determine the barcode in a previous state. | 11-20-2014 |
20140348375 | Forensic Verification Utilizing Halftone Boundaries - A forensic verification system ( | 11-27-2014 |
20140348395 | Forensic Verification from Halftone Images - A forensic verification system ( | 11-27-2014 |
20140376811 | Classifying Images - Methods, and apparatus for performing methods, for classifying an image. Methods include determining a corresponding set of metrics for each region of two or more regions of a pattern of regions of an image, and classifying the image in response to at least the corresponding set of metrics for each of the two or more regions of the pattern of regions. | 12-25-2014 |
20150049949 | Redigitization System and Service - A system and method to error correct extant electronic documents is disclosed. An electronic document may be rasterized to obtain a pixel representation of the electronic document (e.g., raster image). One or more optical character recognition (OCR) tasks may be performed on the raster image of the electronic document. Errors discovered by the OCR tasks may be corrected and a customized error corrected version of the electronic document may be created and stored. If the author of the electronic document is known, the raster image may be compared to a personalized tf*idf error dictionary associated with the author to determine known OCR errors specific to the author. The raster image may also be compared to a personalized electronic error dictionary associated with the author to determine known typographical errors specific to the author. | 02-19-2015 |
20150058622 | DATA STREAM TRAFFIC CONTROL - Techniques related to data stream traffic control are disclosed herein. A bit equivalent entropy of an anonymized data stream is computed. Traffic of the data stream is controlled based on the value of the bit equivalent entropy. | 02-26-2015 |
20150071556 | Selecting Classifier Engines - Methods, and apparatus for performing methods, for selecting a classifier engine. Methods include, for two or more portions of a set of items of known classification, classifying members of each portion using a particular classifier engine; selecting a portion of the set of items whose classifications satisfy a first criteria; classifying members of the selected portion of the set of items using two or more classifier engines; and selecting a classifier engine whose classification of the selected portion of the set of items satisfies a second criteria. | 03-12-2015 |