Patent classifications
H04N1/4446
Dynamic credit report obfuscation
A method for creating a customized and redacted credit report may include transmitting a user request to generate a customized credit report, receiving a copy of a stored credit report, analyzing the copy of the stored credit report, displaying one or more information fields and one or more selectable user interface elements, transmitting a credit report redaction list, and receiving a customized credit report. A user device for configuring a customized credit report may include a processor, a display in communication with the processor, and a non-transitory memory storing instructions that, when executed by the processor, cause the processor to perform processing including transmitting a user request to generate a customized credit report, displaying one or more information fields and one or more selectable user interface elements, transmitting a credit report redaction list, and receiving a shareable credit report link associated with a customized credit report.
Full color, digitally printed copy evident documents
A copy-evident document and a method of printing a copy-evident document wherein a void pantograph is created including a first set of halftone elements and a second set of halftone elements different in modulation from the first set of halftone elements. An overlay including a white image with a plurality of halftone hole locations is preferably formed, wherein the halftone elements of the void pantograph are converted to the plurality of halftone hole locations. The overlay is then preferably merged with a background image, such that portions of the background image are visible at the halftone hole locations of the overlay when printed. The merged image is then printed on print media, wherein the portions of the background image that are printed are printed at locations where the holes locations are present in the overlay creating a copy-evident feature.
Document management system
Provided is a document management system for managing document data by applying access restrictions to each metadata acquired by character recognition of document data to be managed. The mage forming apparatus acquires document data to be managed. The image-processing server performs character recognition of document data and acquires metadata. The image forming apparatus specifies metadata to be concealed in document data. The image forming apparatus receives a security setting, correlates a metadata name to be concealed with the security setting, and transmits the security setting together with document data to the image-processing server. The document-management server, in the case where there is an access request from a user for document data, allows access to the document data based on the security setting by not masking metadata for which there is access authority, and masking metadata for which there is no access authority.
Image processing apparatus and method of controlling an image processing apparatus for censorship processing
An image processing apparatus is communicable with a system including a censorship function, and includes one or more controllers having one or more processors and one or more memories, and the one or more controllers are configured to transmit an image acquired by reading a display medium to the system, receive a censorship result from the system, and control the image processing apparatus to perform a predetermined operation corresponding to the received censorship result, wherein the predetermined operation is a preset operation to be performed by the image processing apparatus based on the received censorship result.
SCAN PRIVACY TOOL AND METHODS USING SENSORS OR CONTROL BUTTONS
A multi-functional printing (MFP) includes a scan privacy tool to allow edits and changes to a scanned document image to remove or hide private information within a document. The scan privacy tool is enabled for jobs on the MFP device and launches when a job is run. The document is scanned and a scanned document image displayed on a display and edit interface of the scan privacy tool. Changes are made to the image using tools available through the scan privacy tool. The changes are applied to the scanned document image. The modified image is saved and transmitted to an engine in the MFP device to complete the job. An external input device, such as control buttons or a motion sensor device, is used to input instructions to the scan privacy tool in order to modify the scanned image.
Image forming apparatus for forming and outputting image on medium
Provided is an image forming apparatus that is capable of protecting the confidentiality of an image that is printed and outputted on paper. The image forming apparatus according to this disclosure is an image forming apparatus that outputs paper on which an image is formed. The image forming apparatus includes an imaging unit, a user-recognizing unit, a person-recognizing unit, and a control unit. The imaging unit performs imaging of the surroundings. The user-recognizing unit recognizes a user of the image forming apparatus. The person-recognizing unit recognizes persons in imaging data obtained by the imaging unit. The control unit performs confidentiality-protected output of outputting the paper so that the image on the paper is shielded when the person-recognizing unit recognizes another person who is other than the user in the imaging data.
Image forming apparatus for printing a banner page using decolorable or non-decolorable toner
According to one embodiment, an image forming apparatus includes a banner page control unit, an image formation control unit, and a printer unit. The banner page control unit acquires banner page setting information indicating setting conditions of a banner page which is inserted between one sheet and another sheet, on which an image is formed by a plurality of jobs. The image formation control unit determines whether or not to form an image of the banner page by a printer unit, based on the banner page setting information. The printer unit forms the image of the banner page, if it is determined by the image formation control unit that the image of the banner page is formed.
Image inspection device for inspecting image, image forming apparatus for forming image, and program for inspection device
An image inspection device includes a hardware processor executing an inspection for a first read image generated by reading a first sheet on which one image is formed, based on a reference image. When an operation for newly generating the reference image is performed in association with the inspection for the first read image, the hardware processor acquires second read images generated by respectively reading second sheets on each of which the one image is formed and generates the reference image using the inspection for the first read image. When an operation for using the generated reference image stored in a storage unit is performed in association with the inspection for the first read image, the hardware processor uses the reference image in the storage unit for the inspection for the first read image, without newly acquiring the second read images.
Correlation mark destroyed on copy
A security apparatus and a method for rendering a security mark can involve creating a security mark that includes a correlation mark having a correlation effect and comprising black pixels and white pixels, and subjecting the security mark to a filter that can removes at least some of the black pixels or the white pixels so that the correlation effect no longer functions and the security mark is not visible when rendered on a recording medium.
Self-Verifying Hidden Digital Media Within Other Digital Media
Self-verifying hidden digital media using a novel interactive component that reveals a secondary hidden watermark. One method reveals at least one hidden image into a visible image, may include the steps of generating, via a processor, a first image that is visible on a computing device screen; generating, via a processor, at least one second image, the at least one second image being in an invisible or nearly invisible state to the human eye in a neutral state and visible in a user activated state. In one embodiment, the activated state of the computing device is achieved when the computing device screen is zoomed in or out, pointer scrolled in a predetermined way, or when the first image has its window size changed.