Abstract:
An approach is provided for a smart card authentication solution utilizing dynamically configurable data to authenticate unrecognized smart cards and communicate with back-end systems not supported by a default environment. The data may be dynamically reconfigured by a user to reflect changes in the authentication environment such as a new smart card type, new data model on a card, or new remote authentication mechanism.
Abstract:
Techniques are provided for securely managing, using smart cards, the usage of a peripheral device. In one embodiment, both the peripheral device and the smart card have digital certificates and a means for authenticating each other. Each device requires authentication of the other device before access to the device's resources is granted. In one embodiment of the invention, the smart card executes a local Java application for managing usage data. The application provides quota and prior usage data to the peripheral device, and updates on the smart card usage data provided by the peripheral device. The usage data on the smart card is used to limit, audit, or track access to resources and operations on the peripheral device. In another embodiment, the authentication and usage management functions of the smart card is implemented on a remote server.
Abstract:
A technique is disclosed for printing, at a local printing device, a print job that was previously stored at a remote printing device. According to one aspect of the technique, a command is received through a console of a local printing device at which a particular print job is not stored. In response to the receipt of the command through the console of the local printing device, the particular print job is requested from a remote printing device at which the particular print job is stored. The particular print job, sent from the remote printing device, is received at the local printing device. The particular print job is printed at the local printing device.
Abstract:
An approach is provided for a smart card authentication solution utilizing dynamically configurable data to authenticate unrecognized smart cards and communicate with back-end systems not supported by a default environment. The data may be dynamically reconfigured by a user to reflect changes in the authentication environment such as a new smart card type, new data model on a card, or new remote authentication mechanism.
Abstract:
A data transmission method and protocol includes progressive coding of a data set into time stamped data packets. The packets are ordered in importance, with some packets being more critical to received data quality than other packets from the same source. If packets are delayed in transit from a source to a receiver, packets of lesser importance are discarded after a set time, a transmission and decoding of a second set of time critical data begins.
Abstract:
A laser tracking interferometric length measuring instrument has a laser source and a tracking articulating optical lever provided on an optical path of an interferometric optical system. To track a retroreflector, the optical lever reflects a laser beam at the retroreflector, which reflects the beam back to the optical lever. This beam is reflected onto a quadrant photodiode. An attitude control means is used to control the attitude of the optical lever so that the laser beam reflected by the optical lever falls on the neutral point of the photodiode.
Abstract:
Techniques are described herein for generating and managing Web applications. Embodiments include receiving organized data and analyzing the organized data to determine one or more data types contained in the organized data. Based on the one or more data types, suggested widgets are determined, including determining whether a particular data type can be split into two or more data types and suggesting widgets for each split data type. The suggested widgets are presented to a user, and in response to user input accepting the suggested widgets, a Web application comprising the suggested widgets is generated.
Abstract:
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on one or more printed documents. An SPD may include extension data that is used to store additional data in association with the scan data. An SPD may include rights management data that is used to provide security to the scan data that is generated based on the SPD. An SPD may be used as a print process definition for dictating how print operations are to be performed. An SPD may be associated with data that identifies one or more scan devices that are prohibited from using the SPD. An SPD may be associated with access delegation data that indicates one or more users who have been delegated access to the SPD.
Abstract:
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on one or more printed documents. An SPD may include extension data that is used to store additional data in association with the scan data. An SPD may include rights management data that is used to provide security to the scan data that is generated based on the SPD. An SPD may be used as a print process definition for dictating how print operations are to be performed. An SPD may be associated with data that identifies one or more scan devices that are prohibited from using the SPD. An SPD may be associated with access delegation data that indicates one or more users who have been delegated access to the SPD.
Abstract:
Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on one or more printed documents. An SPD may include extension data that is used to store additional data in association with the scan data. An SPD may include rights management data that is used to provide security to the scan data that is generated based on the SPD. An SPD may be used as a print process definition for dictating how print operations are to be performed. An SPD may be associated with data that identifies one or more scan devices that are prohibited from using the SPD. An SPD may be associated with access delegation data that indicates one or more users who have been delegated access to the SPD.