H04N2201/3281

Cryptographic printhead

A printer is configured with a processor which calculates printhead control parameters, the control parameters being determined by the processor in such a way as to optimize the printing process of the printer's printhead. The processor determines the printhead control parameters according to an optimization algorithm stored in the printer. To maintain the internal security of the optimization algorithm, the printhead control parameters are encrypted by the processor. The encrypted printhead control parameters are then transmitted to the printhead via an internal data path of the printer. If a third party monitors the data along the internal data path, the encryption algorithm remains secure because the control parameters are encrypted. The printhead contains a second, dedicated processor. The printhead processor receives the encrypted printhead control parameters, and decrypts the control parameters. The printhead then prints according to the decrypted printhead control parameters, ensuring optimized printing.

METHOD AND APPARATUS TO GENERATE ENCRYPTED CODES ASSOCIATED WITH A DOCUMENT

A multi-function device (MFD) is disclosed. For example, the MFD includes a communication interface to establish a communication path with a remote server, a user interface to receive a request to create an electronic file based on a scan of a document, a processor, and a non-transitory computer-readable medium storing a plurality of instructions. The instructions when executed by the processor cause the processor to scan the document to create the electronic file of the document, generate an encryption code associated with the electronic file of the document that is scanned, and transmit the electronic file to the remote server.

Methods and apparatus for color image watermarking

A method embeds a watermark image into a host image with adaptive rectangular partition and Lower Upper (LU) decomposition such that a watermarked image is generated with improved computational complexity. The method divides a host image into an Red (R) component, a Green (G) component, and a Blue (B) component, and divides each component of the R, G, and B components into a plurality of MM size blocks, and partitions each of the plurality of MM size blocks into a plurality of non-overlapping blocks with adaptive rectangular partition. The method selects a plurality of embedding blocks from the plurality of MM size blocks for each component of the R, G, and B components of the host image to embed watermark information such that the watermarked image is generated.

SYSTEM AND METHOD FOR RANDOMIZING HIDDEN MESSAGES IN DIGITAL FILES

A system and method for encoding data into a digital file includes identifying an input digital file, an output digital file, and data to be encoded into the output digital file. The data that is to be encoded is masked based on a masking algorithm and encoded into the output digital file at bit locations identified by an encoding algorithm, starting from pre-identified start location. The start location, the masking algorithm, and encoding algorithm are encoded into a metadata file, and the metadata file is also encoded into the output digital file. The input and output digital files are sent to a receiving device that is configured to extract the data from the output digital file, and apply the extracted data to perform an action. The action may be authenticating or authorizing a user based on the extracted data, or completing a transaction.

ENCRYPTED DOCUMENT PRINTING UTILIZING MULTIPLE NETWORKS

In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.

Information processing apparatus and non-transitory computer readable storage medium for determining a communication unit having a faster speed for encrypted communication
10244465 · 2019-03-26 · ·

An information processing apparatus includes plural communication units, a determination unit, and a controller. The communication units are configured to conduct a wireless communication at different communication speeds. The determination unit is configured to determine a communication unit having a faster communication speed in order to transmit or receive an encrypted communication object. The controller is configured to perform a control to start a communication by the communication unit determined by the determination unit.

HALFTONE SCREENS ENCODING SIGNATURES

In an example, a method includes, at least one processor, in response to each of a plurality of requests, determining a halftone screen. Determining the halftone screen comprises encoding a signature pattern in the halftone screen, and halftone screens for different requests may be encoded with a different signature pattern. The halftone screen may be arranged such that, when applied to image data to provide a printed output, the pattern is discernible therein to provide a signature for the printed output.

CRYPTOGRAPHIC PRINTHEAD
20190042901 · 2019-02-07 ·

A printer is configured with a processor which calculates printhead control parameters, the control parameters being determined by the processor in such a way as to optimize the printing process of the printer's printhead. The processor determines the printhead control parameters according to an optimization algorithm stored in the printer. To maintain the internal security of the optimization algorithm, the printhead control parameters are encrypted by the processor. The encrypted printhead control parameters are then transmitted to the printhead via an internal data path of the printer. If a third party monitors the data along the internal data path, the encryption algorithm remains secure because the control parameters are encrypted. The printhead contains a second, dedicated processor. The printhead processor receives the encrypted printhead control parameters, and decrypts the control parameters. The printhead then prints according to the decrypted printhead control parameters, ensuring optimized printing.

SYSTEM FOR EMBEDDING SEARCHABLE INFORMATION, ENCRYPTION, SIGNING OPERATION, TRANSMISSION, STORAGE AND RETRIEVAL
20190005599 · 2019-01-03 ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

Image forming apparatus having port to which portable memory is attachable
12058295 · 2024-08-06 · ·

An image forming apparatus includes a controller and a memory interface having a port to receive a portable memory. The controller performs a portable memory using process that includes storing data in a dedicated memory, and performing a process using the data stored in the dedicated memory in response to an operation received via a user interface. The controller stores, before the portable memory using process, identification information in a portable memory attached to the port, thereby setting the portable memory as the dedicated memory. The controller determines whether a target portable memory as attached to the port is set as the dedicated memory, based on whether the identification information is stored in the target portable memory. The controller determines whether to display a first screen or a second screen, based on whether the target portable memory is set as the dedicated memory.