H04N1/32272

Registering Published Documents in a Blockchain
20190026496 · 2019-01-24 ·

A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can use a document's prior registration date in a blockchain to establish a no-later than date-of-existence for that document. Embodiments can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.

Linking secure and non-secure digital imaging using digital imagers for production of lottery tickets or other documents

A method and system include digitally imaging a secure portion and a non-secure portion of scratch-off coating protected gaming documents of at least one game, the gaming documents including variable indicia, the gaming documents and the at least one game being associated with at least one overall print run, each print run including (i) a plurality of non-winning gaming documents and (ii) a plurality of winning gaming documents determined by revealing secure variable indicia according to predetermined game programming, and wherein at least the secure portion of digital imaging is hidden under the scratch-off coating. The secure portion can be encrypted into ciphertext with the non-secure portion remaining plaintext or cleartext. This enables digital imaging on demand across a local or distributed network of both secure and non-secure areas of instant lottery tickets or other documents having scratch-off coatings.

IMAGE PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM
20190020786 · 2019-01-17 ·

The image processing apparatus capable of executing a transmission job for transmitting image data to a destination that accepts a setting for notifying an end of the transmission job, converts image data to image data of a first format without encrypting, and executes a first transmission job for transmitting the image data of the first format. In accordance with the setting, the image data of the first format and an end of the first transmission job are notified to a predetermined destination. In addition, the image data is encrypted to convert it to image data of a second format, and a second transmission job for transmitting the image data of the second format is executed. In accordance with the setting, an end of the second transmission job is notified to the predetermined destination.

SYSTEM FOR EMBEDDING SEARCHABLE INFORMATION, ENCRYPTION, SIGNING OPERATION, TRANSMISSION, STORAGE AND RETRIEVAL
20190005599 · 2019-01-03 ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

METHODS AND SYSTEMS FOR PERFORMING STRUCTURE-PRESERVING OBFUSCATION ON EMAILS
20190007358 · 2019-01-03 ·

A method of obfuscating at least a portion of content of an email message may include identifying an email message that has been sent to one or more recipients and that pertains to one or more end user processes of a print environment, identifying a content section of the email message, and identifying one or more delimiters associated with the identified content section. The method involves determining whether the identified content section includes the delimiters, and if so, generating an obfuscated content section by obfuscating all content of the identified content section except the one or more identified delimiters. The method includes analyzing the obfuscated content section to ascertain information relevant to the one or more end user processes, and associating the ascertained information with one or more of the one or more end user processes.

Method and system for hiding reversible data based on prediction errors

A method and system for hiding reversible data based on prediction errors are provided, where the method includes: partitioning an image, to obtain a shadow part and a blank part; performing a first-layer embedding process on the shadow part; performing a multi-layer embedding process on the blank part; extracting outermost layer information of the blank part after the multilayer embedding process; and extracting information of the shadow part after the first-layer embedding process. According to the method in the present disclosure, a problem of image distortion during high-capacity data embedding can be effectively solved.

LINKING SECURE AND NON-SECURE DIGITAL IMAGING USING DIGITAL IMAGERS FOR PRODUCTION OF LOTTERY TICKETS OR OTHER DOCUMENTS

A method and system include digitally imaging a secure portion and a non-secure portion of scratch-off coating protected gaming documents of at least one game, the gaming documents including variable indicia, the gaming documents and the at least one game being associated with at least one overall print run, each print run including (i) a plurality of non-winning gaming documents and (ii) a plurality of winning gaming documents determined by revealing secure variable indicia according to predetermined game programming, and wherein at least the secure portion of digital imaging is hidden under the scratch-off coating. The secure portion can be encrypted into ciphertext with the non-secure portion remaining plaintext or cleartext. This enables digital imaging on demand across a local or distributed network of both secure and non-secure areas of instant lottery tickets or other documents having scratch-off coatings.

ENCRYPTING AND DECRYPTING POSTSCRIPT LANGUAGE

A method of encrypting at least a portion of PostScript vector language, where the PostScript vector language includes a cleartext portion and a ciphertext portion, the method including: (a) encrypting at least a part of the PostScript cleartext portion via an encryption algorithm with a generated encryption key resulting in at least a part of the ciphertext portion and overwriting the PostScript cleartext portion with the resulting at least part of the ciphertext portion; (b) saving the encryption key in a file separate from a file containing the PostScript vector language; (c) linking both the encryption key file and the PostScript file in an image processor interpreting the PostScript vector language to display or print PostScript graphics; (d) decrypting the at least part of the ciphertext portion resulting in decrypted PostScript cleartext; and (e) executing the resulting decrypted Postscript cleartext to produce an image on a document or screen.

Document data processing including image-based tokenization

A system may capture an image of a physical item, perform digital image processing to identify features of the physical item from the image, and generate a digital token for the physical item based on the digital image processing.

METHOD OF USING MIDDLEWARE FOR GENERATING VECTOR GRAPHICS IMAGED SECURITY DOCUMENTS
20180304145 · 2018-10-25 ·

A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non- vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.