H04N2201/3235

System for digitizing and processing resource documents
11297197 · 2022-04-05 · ·

Embodiments of the invention include systems, methods, and computer-program products for digitizing and processing transmission of a physical resource document from an issuer to a user and from a user to a processing institution for real-time posting of physical resource documents. In this way, the invention processes a physical resource document into an image format at the issuer and transmits a secure digital image file to the user. The image format is processed and digitized for resource processing. Upon user receipt, the system validates the resource distribution. Upon validation the system allows for processing the resource document and the resource distribution from that document as a digital real-time payment.

Systems and methods for maintaining chain of custody for assets offloaded from a portable electronic device

Systems and methods for maintaining chain of custody for assets offloaded from a portable electronic device. One exemplary system includes an electronic processor configured to receive, from the portable electronic device, an asset manifest including an asset identifier, a fixed-length unique identifier associated with the asset identifier, and a manifest digital signature. The electronic processor is further configured to transmit to the portable electronic device a storage message based on the asset manifest; receive, from the portable electronic device, an upload completion message; retrieve, from a data warehouse an asset file; and determine, for the asset file, an asset file fixed-length unique identifier. The electronic processor is further configured to determine whether the fixed-length unique identifier matches the asset file fixed-length unique identifier; determine whether the manifest digital signature is valid; and to transmit an asset deletion permission message when identifiers match and the digital signature is valid.

Method for Producing Security Elements in an Image Which are not Visible to the Human Eye and Cannot be Copied, and Printed Image
20210245542 · 2021-08-12 ·

A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.

Method for Checking the Authenticity of Products and Printed Image
20210248369 · 2021-08-12 ·

A method for checking the authenticity of products, by checking an image (A) of a product. The proof of authenticity is not visible to the human eye and cannot be copied. This is characterized in that a code stored in a halftone image by manipulation of dots and/or a manipulated field bounded in the halftone image can be read by means of an optical device and compared with a retrievable value in at least one database. In at least one field (F1 to F5) a part of a serial number is determined which describes the structure of the serial number and a hash function used for transmitting the serial number to the database, and this is also characterized in that the serial number is subsequently assembled and encrypted with the corresponding hash function.

System for visual password input and method for accepting a visual password input
11042625 · 2021-06-22 ·

A system for visual password input. The system for visual password input includes an electronic device having a display, wherein the electronic device further includes a camera. A processor disposed within the electronic device includes a non-transitory computer readable memory having a logic thereon, wherein the logic provides a login screen to the display, wherein the login screen prevents access to the electronic device until an authentication signal is verified. The authentication signal comprises an image capture received by the camera, wherein the image capture is compared to an image data of a password object stored on the non-transitory computer readable memory and analyzed to determine whether the image capture matches the image data of the password object within a confidence interval. Access is then provided to the electronic device if the image capture matches the image data of the password object.

SYSTEM FOR DIGITIZING AND PROCESSING RESOURCE DOCUMENTS
20210218858 · 2021-07-15 · ·

Embodiments of the invention include systems, methods, and computer-program products for digitizing and processing transmission of a physical resource document from an issuer to a user and from a user to a processing institution for real-time posting of physical resource documents. In this way, the invention processes a physical resource document into an image format at the issuer and transmits a secure digital image file to the user. The image format is processed and digitized for resource processing. Upon user receipt, the system validates the resource distribution. Upon validation the system allows for processing the resource document and the resource distribution from that document as a digital real-time payment.

Communication device and non-transitory computer-readable medium storing computer-readable instructions for communication device or server

A communication device may receive a target IP address from a target device; after the target IP address which is a global IP address has been received from the target device, send a request signal including the target IP address to a server, the request signal being for causing the server to send a specific signal, the specific signal including the target IP address as a destination IP address; determine whether first information is received from the server, wherein the first information is received from the server in a case where the server receives a response signal including the target IP address as a source IP address in response to the server having sent the specific signal; and in a case where it is determined that the first information is received, execute a security process.

SYSTEM FOR EMBEDDING SEARCHABLE INFORMATION, ENCRYPTION, SIGNING OPERATION, TRANSMISSION, STORAGE AND RETRIEVAL
20200219221 · 2020-07-09 ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

Determining image forensics using an estimated camera response function
10621430 · 2020-04-14 · ·

An image forensics system estimates a camera response function (CRF) associated with a digital image, and compares the estimated CRF to a set of rules and compares the estimated CRF to a known CRF. The known CRF is associated with a make and a model of an image sensing device. The system applies a fusion analysis to results obtained from comparing the estimated CRF to a set of rules and from comparing the estimated CRF to the known CRF, and assesses the integrity of the digital image as a function of the fusion analysis.

Printing apparatus, control method of printing apparatus, and network system
10615983 · 2020-04-07 · ·

A printing apparatus includes: a printing apparatus storage unit that stores firmware to which a public key is added, the public key being information related to a public key encryption method; a printing apparatus network-communication unit that receives signature information obtained by encrypting a hash value of overwriting firmware with a private key corresponding to the public key, from the management server, and that receives the overwriting firmware from the file providing server; and a printing apparatus control unit that determines validity of the overwriting firmware by comparing a hash value generated by decrypting the signature information which is received from the management server with the public key stored in the printing apparatus storage unit, and a hash value of the overwriting firmware which is received from the file providing server.