G06K15/4095

Information processing system and control method to execute a function of printer using local authentication information associated with the function on client device logging into cloud server
10761793 · 2020-09-01 · ·

A function of a device is displayed as a first display on a client device, and local user authentication information is displayed as a second display according to the function of the device selected on the first display on the client device.

Image erasing apparatus and image erasing method

According to an embodiment, an image erasing apparatus includes a reading unit, an erasing unit, an image forming unit, and a controller. The reading unit reads identification information formed on a sheet conveyed. The erasing unit erases a part or all of a first image formed on the sheet after the identification information is read. The controller obtains image data corresponding to the identification information that is read by the reading unit. The controller controls the image forming unit so as to form a second image, which is indicated by the obtained image data, onto the sheet from which the first image has been erased.

METHOD OF USING MIDDLEWARE FOR GENERATING VECTOR GRAPHICS IMAGED SECURITY DOCUMENTS
20200204703 · 2020-06-25 ·

A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.

Computation system, computation device, method thereof, and program to perform information processing

A computation device accepts a first processing request output from a first external device, executes first processing, which does not involve outputting information to a second external device, of processing based on the first processing request until the first processing request is judged to satisfy a predetermined security level, and executes second processing, which involves outputting information to the second external device, of the processing based on the processing request after the first processing request is judged to satisfy the security level.

PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM FOR ARRANGING PROCESS RECEIVING PORTION ON DISPLAY REGION
20200186657 · 2020-06-11 · ·

A processing apparatus includes: a processing unit that performs plural predetermined processes; a display unit; a creation unit that creates a first process receiving portion and a second process receiving portion, each of which receives an instruction to any one of the plural predetermined processes on the display unit; and an execution portion that executes the process, in a case where the instruction is received by the first process receiving portion, after receiving the instruction again, whereas, in a case where the instruction is received by the second process receiving portion, the execution portion executing the process without receiving the instruction again.

DIGITAL COMPOSITION HASHING

Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.

ON-VEHICLE AUTHENTICATION SYSTEM, COMMUNICATION DEVICE, ON-VEHICLE AUTHENTICATION DEVICE, COMMUNICATION DEVICE AUTHENTICATION METHOD AND COMMUNICATION DEVICE MANUFACTURING METHOD
20200153636 · 2020-05-14 ·

A communication device stores a first secret key and a first public key, and the on-vehicle authentication device stores a second secret key, a second public key and a signature verification key. The on-vehicle authentication device acquires the first public key, verifies the authenticity of the electronic signature using a signature verification key, encrypts the second public key using the authentic first public key and transmits the encrypted second public key. The communication device receives the encrypted second public key, decrypts the encrypted second public key using the first secret key, encrypts the first public key using the decrypted second public key. The on-vehicle authentication device receives the encrypted first public key, decrypts the encrypted first public key using the second secret key, and authenticates that the communication device is an authentic device when the decrypted first public key has been determined to be authentic.

Image forming apparatus, processing device, and non-transitory computer-readable medium
10649620 · 2020-05-12 · ·

Provided is an image forming apparatus including a processing unit that performs a predetermined process for forming an image, a display unit that displays a first screen for displaying Q setting items out of P setting items for setting conditions in which the processing unit performs the process to set the Q setting items or a second screen for displaying R setting items out of the P setting items to set the R setting items, and a switching unit that switches a display screen to be displayed on the display unit between the first screen and the second screen based on a user's instruction, wherein all of the P setting items are capable to be set using the Q setting items displayed on the first screen and the R setting items displayed on the second screen.

USING OBJECT FLOW INTEGRITY TO IMPROVE SOFTWARE SECURITY
20200117803 · 2020-04-16 ·

The present disclosure is directed to a method of creating an object flow integrity (OFI) library module, capable of redirecting an object-like programmatic call, by initiating a multi-pass, recursive process to analyze a module's interfaces, function parameters, and data types. In another aspect, a method is disclosed to modify the binary code of an untrusted module to enable its usage of the OFI library module. In another aspect, during runtime operations of an untrusted module, the OFI library module can receive an object from a caller module, substitute a proxy object, stored in a secure location, and continue the programmatic call using the proxy object.

IMAGE FORMING APPARATUS, RECORDING MEDIUM STORING CONTROL PROGRAM AND CONTROL METHOD
20200104078 · 2020-04-02 ·

This image forming apparatus includes an image former, and data of a print job executed by the image forming apparatus is registered in a print job table. In addition, the image forming apparatus includes a holding function of, when executing a print job based on print data transmitted from an external terminal, enabling the print job to be executed only when a user confirms the print job. When an error occurs while executing the print job, the image forming apparatus automatically deletes print job data based on print data acquired in a state where the holding function is enabled, among the print jobs based on the print data transmitted from the external terminal.