H04N1/32272

Transmission of encrypted image data
10291814 · 2019-05-14 · ·

In one example, a system for transmitting encrypted data includes a processor to select a virtual channel to be encrypted between an application processor and an image sensor during an initialization process. The processor can also transmit a virtual channel command corresponding to the selected virtual channel to the image sensor. The processor can also poll a register in the image sensor to verify the image sensor has stored an encryption key corresponding to the selected virtual channel and detect image data from the image sensor via the virtual channel, the image data encrypted with the encryption key.

TRUSTED INDICATORS TO SECURE VISUAL OUTPUTS
20190138700 · 2019-05-09 ·

An example display device for securing graphics outputs includes: a checker to check whether a secure output marker is located in a pre-determined position in graphical information of a digital image; a verifier to verify whether first data in the secure output marker matches actual data in a trusted output area of the digital image; and autonomous indicator control logic to activate a hardware-based trusted output indicator when the first data matches the actual data, the autonomous indicator control logic not accessible by computing applications executing on a system in communication with the display device.

Authenticating printed paper documents and websites against a blockchain record
10255460 · 2019-04-09 ·

A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can use a document's prior registration date in a blockchain to establish a no-later-than date-of-existence for that document. Embodiments can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.

HALFTONE SCREENS ENCODING SIGNATURES

In an example, a method includes, at least one processor, in response to each of a plurality of requests, determining a halftone screen. Determining the halftone screen comprises encoding a signature pattern in the halftone screen, and halftone screens for different requests may be encoded with a different signature pattern. The halftone screen may be arranged such that, when applied to image data to provide a printed output, the pattern is discernible therein to provide a signature for the printed output.

Trusted indicators to secure visual outputs

An example apparatus includes: memory; instructions in the apparatus; and at least one processor to execute the instructions to: check for proof of trust information in one or more pre-determined positions in a trusted digital image, the proof of trust information including a secure output marker, the secure output marker indicative of information corresponding to a trusted output area of the trusted digital image; decrypt the secure output marker using one or more security keys from a trusted execution environment (TEE), the TEE isolated from a computing application; and enable activation of a trusted output indicator in response to a match between first data corresponding to the secure output marker and second data corresponding to the trusted output area of the trusted digital image.

Systems and methods for digitally watermarking resources produced by an online software platform
12052400 · 2024-07-30 · ·

Systems and methods electronically uniquely imprint a digital watermark on produced resources, such as on data or electronic documents produced by an online software platform (OSP), in nearly invisible ways that are likely to survive subsequent processing. In one embodiment the OSP stores a plurality of resource digital rules used for producing resources for respective relationship instances of primary entities with other entities; receives a dataset on behalf of a primary entity, in which the dataset includes data representing a relationship instance between the primary entity and a secondary entity; in response to the received dataset, produces a resource based on applying one or more of the plurality of resource digital rules to the dataset; and digitally watermarks the produced resource with a digital watermark such that the produced resource is identifiable via the digital watermark as having been produced by the OSP.

Systems and methods for digitally watermarking resources produced by an online software platform
12052401 · 2024-07-30 · ·

Systems and methods electronically uniquely imprint a digital watermark on produced resources, such as on data or electronic documents produced by an online software platform (OSP), in nearly invisible ways that are likely to survive subsequent processing. In one embodiment the OSP stores a plurality of resource digital rules used for producing resources for respective relationship instances of primary entities with other entities; receives a dataset on behalf of a primary entity, in which the dataset includes data representing a relationship instance between the primary entity and a secondary entity; in response to the received dataset, produces a resource based on applying one or more of the plurality of resource digital rules to the dataset; and digitally watermarks the produced resource with a digital watermark such that the produced resource is identifiable via the digital watermark as having been produced by the OSP.

Trusted indicators to secure visual outputs

Providing secure graphics outputs by performing at least the following: receive secure output data corresponding to a digital image, obtain one or more security keys, create a secure output marker for the secure output data, wherein the secure output marker comprises location information corresponding to a trusted output area of the digital image and data information that represents data content found within the trusted output area of the digital image, encrypt the secure output marker using the one or more security keys, embed the secure output marker within the graphics image to create a trusted graphics image; and render the trusted graphics image for exposure onto the display device.

CRYPTOGRAPHIC PRINTHEAD
20190042901 · 2019-02-07 ·

A printer is configured with a processor which calculates printhead control parameters, the control parameters being determined by the processor in such a way as to optimize the printing process of the printer's printhead. The processor determines the printhead control parameters according to an optimization algorithm stored in the printer. To maintain the internal security of the optimization algorithm, the printhead control parameters are encrypted by the processor. The encrypted printhead control parameters are then transmitted to the printhead via an internal data path of the printer. If a third party monitors the data along the internal data path, the encryption algorithm remains secure because the control parameters are encrypted. The printhead contains a second, dedicated processor. The printhead processor receives the encrypted printhead control parameters, and decrypts the control parameters. The printhead then prints according to the decrypted printhead control parameters, ensuring optimized printing.

Methods and systems for performing structure-preserving obfuscation on emails
10200331 · 2019-02-05 · ·

A method of obfuscating at least a portion of content of an email message may include identifying an email message that has been sent to one or more recipients and that pertains to one or more end user processes of a print environment, identifying a content section of the email message, and identifying one or more delimiters associated with the identified content section. The method involves determining whether the identified content section includes the delimiters, and if so, generating an obfuscated content section by obfuscating all content of the identified content section except the one or more identified delimiters. The method includes analyzing the obfuscated content section to ascertain information relevant to the one or more end user processes, and associating the ascertained information with one or more of the one or more end user processes.