H04N1/32272

Encryption device, computer-readable recording medium, and encryption method
10455111 · 2019-10-22 · ·

An encryption circuit includes a fundamental vector generation circuit configured to generate a random number sequence for serving as a fundamental vector based on an initial vector, an image mask generation circuit configured to generate an image mask with a mask value set for each pixel in a region to be encrypted smaller than a frame size of the image, based on the fundamental vector and coordinate information for specifying the region to be encrypted, and an XOR operation circuit configured to compute an exclusive OR between each mask value of the image mask and each pixel value of the image data to generate encrypted image data.

PRINTING APPARATUS, CONTROL METHOD FOR PRINTING APPARATUS, AND STORAGE MEDIUM
20190320083 · 2019-10-17 ·

Ability information about an authentication printing function to be transmitted from a printing apparatus to a print client is varied depending on whether a communication path between the apparatuses is encrypted.

Image processing apparatus, method of controlling the same, and storage medium
10412266 · 2019-09-10 · ·

When this image processing apparatus accepts an initial connection request from a mobile terminal, it displays a generated PIN code on a console unit 210, and when it accepts information corresponding to the PIN code from the mobile terminal, it compares that information with the generated PIN code, and performs authentication. When the authentication is successful, it generates a public key and a private key, and transmits the generated public key to the mobile terminal.

System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval
10387986 · 2019-08-20 · ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

Imaging systems with data encryption and embedding capabalities

An imaging system may embed encrypted data into image data. The imaging system may generate image data in response to light received at a pixel array. The imaging system may include encryption circuitry that accesses an encryption key. The encryption circuitry may receive data related to the imaging system and/or to an environment in which an image is captured and encrypt the data using the encryption key. The imaging system may include data embedding circuitry that embeds the encrypted data into the image data to generate an output image. The components of the imaging system may be formed on a single imaging system chip. The encrypted data embedded in the output image may be extracted using an extraction engine and decrypted using a decryption engine and decryption key such that the data may be accessed by a user with access to the decryption key.

Halftone screens encoding signatures

In an example, a method includes, at least one processor, in response to each of a plurality of requests, determining a halftone screen. Determining the halftone screen comprises encoding a signature pattern in the halftone screen, and halftone screens for different requests may be encoded with a different signature pattern. The halftone screen may be arranged such that, when applied to image data to provide a printed output, the pattern is discernible therein to provide a signature for the printed output.

Cryptographic printhead

A printer is configured with a processor which calculates printhead control parameters, the control parameters being determined by the processor in such a way as to optimize the printing process of the printer's printhead. The processor determines the printhead control parameters according to an optimization algorithm stored in the printer. To maintain the internal security of the optimization algorithm, the printhead control parameters are encrypted by the processor. The encrypted printhead control parameters are then transmitted to the printhead via an internal data path of the printer. If a third party monitors the data along the internal data path, the encryption algorithm remains secure because the control parameters are encrypted. The printhead contains a second, dedicated processor. The printhead processor receives the encrypted printhead control parameters, and decrypts the control parameters. The printhead then prints according to the decrypted printhead control parameters, ensuring optimized printing.

Information processing apparatus, information processing method, and non-transitory computer readable storage medium
10347372 · 2019-07-09 · ·

An information processing apparatus includes an identifier generator, a reversible converter, and an assignment unit. The identifier generator generates first identifiers which are uniquely specified. The reversible converter reversibly converts the first identifiers to generate second identifiers. The assignment unit assigns the second identifiers to processes to be assigned with identifiers.

INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING TERMINAL
20240214501 · 2024-06-27 · ·

An information processing system includes: a server including a first processor configured to function as a virtual device that is provided on a one-to-one basis with a predetermined information processing apparatus and mediates exchange of information between an application and the information processing apparatus; the information processing apparatus including a second processor, in a case of exchanging predetermined confidential information with the application via the virtual device, the second processor configured to exchange the information by converting the information into a format in which the information is to be referred to by the information processing apparatus and the application and is not to be referred to by the virtual device; and an information processing terminal including a third processor configured to function as the application, and exchange the information by converting the information into a format in which the information is to be referred to by the information processing terminal and the application and is not to be referred to by the virtual device, in a case of exchanging the confidential information with the information processing apparatus via the virtual device.

METHOD FOR PREVENTING IMAGE MODIFICATION, IMAGE CAPTURING DEVICE AND IMAGE VERIFICATION METHOD
20190158698 · 2019-05-23 ·

A method for preventing image modification, an image capturing device and an image verification method are disclosed. The image modification method includes: processing a compressed image of at least one frame to obtain feature data of the compressed image of the at least one frame; encrypting the feature data to generate a checksum; generating supplemental enhancement information, which at least includes a time parameter and the checksum; and transmitting and/or storing the supplemental enhancement information and the compressed image of the at least one frame together so as to verify authenticity of the compressed image of the at least one frame by using the supplemental enhancement information. The time parameter is a counter value of a counter in the image capturing device and the counter value continuously increases. With the above method, authenticity of image data can be verified.