H04N1/32283

PRINTING APPARATUS, CONTROL METHOD FOR PRINTING APPARATUS, AND STORAGE MEDIUM
20190320083 · 2019-10-17 ·

Ability information about an authentication printing function to be transmitted from a printing apparatus to a print client is varied depending on whether a communication path between the apparatuses is encrypted.

Methods for requesting and authenticating photographic image data

A system and method include obtaining and authenticating image files from users, such as insured users, at the request of an entity, such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. An authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

CONVERTING BIOMETRIC DATA INTO TWO-DIMENSIONAL IMAGES FOR USE IN AUTHENTICATION PROCESSES
20190208076 · 2019-07-04 ·

Methods and systems for converting biometric data into two-dimensional images for use in authentication processes are described. Biometric data is received and then hashed into a string of characters. A 2-D image is created based on the hashed string of characters. The 2-D image is then provided for printing on a personal transaction card.

METHODS AND APPARATUS TO IDENTIFY MEDIA USING HYBRID HASH KEYS
20190124211 · 2019-04-25 ·

Apparatus, system, methods, and articles of manufacture are disclosed to identify media using hash keys. An example system includes a hybrid hash key analyzer to access a metered hash key of an exposure record obtained from a meter, access reference records representative of respective portions of a plurality of media, and determine reference confirmation data candidates from respective ones of the reference records that include hash keys matching the metered hash key. The example system includes an impression logger to, when first confirmation data associated with the exposure record matches one of the reference confirmation data candidates, store an impression record that associates the media identification data associated with the matching one of the reference confirmation data candidates with a meter identifier of the exposure record. The impression logger also is to credit at least a portion of the media corresponding to the media identification data with an exposure credit.

Methods and apparatus to identify media using hybrid hash keys

Methods and apparatus are disclosed to identify media using hash keys. An example disclosed method includes generating a hash key based on first samples of media. In the disclosed example method, the first samples corresponds to a portion of the media sampled in a buffer of a computing device. The example method also includes applying a blurring function to the hash key to generate a blurred hash key. The example method also includes generating first confirmation data based on second samples of the media. The example method also includes storing the blurred hash key in association with the first confirmation data and first reference data in a memory separate from the buffer of the sampled media. In the example methods, the reference data identifies the portion of the media.

Methods and systems for performing structure-preserving obfuscation on emails
10200331 · 2019-02-05 · ·

A method of obfuscating at least a portion of content of an email message may include identifying an email message that has been sent to one or more recipients and that pertains to one or more end user processes of a print environment, identifying a content section of the email message, and identifying one or more delimiters associated with the identified content section. The method involves determining whether the identified content section includes the delimiters, and if so, generating an obfuscated content section by obfuscating all content of the identified content section except the one or more identified delimiters. The method includes analyzing the obfuscated content section to ascertain information relevant to the one or more end user processes, and associating the ascertained information with one or more of the one or more end user processes.

METHODS AND SYSTEMS FOR PERFORMING STRUCTURE-PRESERVING OBFUSCATION ON EMAILS
20190007358 · 2019-01-03 ·

A method of obfuscating at least a portion of content of an email message may include identifying an email message that has been sent to one or more recipients and that pertains to one or more end user processes of a print environment, identifying a content section of the email message, and identifying one or more delimiters associated with the identified content section. The method involves determining whether the identified content section includes the delimiters, and if so, generating an obfuscated content section by obfuscating all content of the identified content section except the one or more identified delimiters. The method includes analyzing the obfuscated content section to ascertain information relevant to the one or more end user processes, and associating the ascertained information with one or more of the one or more end user processes.

CONTENT METADATA DIRECTORY SERVICES
20180253505 · 2018-09-06 ·

Signals sensed from packaging of products are processed in a distributed reader and metadata routing system to provide metadata responses to mobile application programs. A routing system registers identifiers for different content ID schema. These identifiers are encoded packaging. Mobile device application programs are equipped with reader programs to extract identifiers from packaging. Metadata responses are identified by the ID provider of the content ID schema and extracted identifiers. The metadata routing system routes metadata responses to a requesting mobile device, supporting a variety of different ID providers and mobile device applications.

Methods for requesting and authenticating photographic image data

A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

Trusted media device and process for authentication of digital media
12120282 · 2024-10-15 · ·

A trusted media device for use with a digital camera to create trusted media files that provide assurance that the media file captures a real-world scene and is not synthetic (for example, AI-generated) media. The trusted media device includes a digital camera and provides for generation of a trusted media file after authentication of fingerprints associated with the digital camera and the trusted media device and authentication of perceptual hashes for captured images. Embodiments of the disclosure further include processes for pairing the trusted media device and viewing and editing the trusted media file.