摘要:
A computer-based method and a system for adding and printing variable security data. The system includes a memory, a processor, and a printer. The memory stores received print data. The processor modifies the print data for adding variable security print data and sends the modified print data for printing. The printer receives and prints the modified print data. The variable security data may vary between different printing operations. The processor captures a portion of the stored print data based on data-capturing criteria and modifies the stored print data based on the captured portion of the stored print data. The data-capturing criteria may be user-defined and may include leading tag data, trailing tag data, matching tag data, or combinations thereof for indicating a relative position of the captured data.
摘要:
A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
摘要:
A computer-based method and a system for adding and printing variable security data. The system includes a memory, a processor, and a printer. The memory stores received print data. The processor modifies the print data for adding variable security print data and sends the modified print data for printing. The printer receives and prints the modified print data. The variable security data may vary between different printing operations. The processor captures a portion of the stored print data based on data-capturing criteria and modifies the stored print data based on the captured portion of the stored print data. The data-capturing criteria may be user-defined and may include leading tag data, trailing tag data, matching tag data, or combinations thereof for indicating a relative position of the captured data.
摘要:
A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
摘要:
A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
摘要:
A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
摘要:
A computer-based system and method are provided for targeting advertisement to a user of a product based on interests of the user. The system includes a first computer-based device that operates a rule-defining software for receiving rule-defining data. A web server stores rules in a database based on the rule-defining data. A second computer-based device detects a product identifier and operates a web browser for displaying a webpage based on the product identifier. The web server determines product data based on the product identifier and retrieves or determines user interest data corresponding to interests of the user. The web server applies one or more of the stored rules to the product data and the user interest data, and modifies at least a page part of the webpage.
摘要:
A method of generating a large number of different void pantographs quickly and easily enables selecting a void pantograph that works best with a particular copy machine make and model. The background patterns are generated by varying the size of the dots and placement of the dots on an X-Y grid. The foreground pattern is generated by varying the size of the dots and placement of the dots on an X-Y grid. The foreground and background patterns may be generated by combining two separate patterns. A foreground pattern is combined with multiple background patterns to produce the different void pantographs. A full page of void pantographs having a similar density is tested on a copy machine to determine which one works the best.
摘要:
A method of generating a large number of different void pantographs quickly and easily enables selecting a void pantograph that works best with a particular copy machine make and model. The background patterns are generated by varying the size of the dots and placement of the dots on an X-Y grid. The foreground pattern is generated by varying the size of the dots and placement of the dots on an X-Y grid. The foreground and background patterns may be generated by combining two separate patterns. A foreground pattern is combined with multiple background patterns to produce the different void pantographs. A full page of void pantographs having a similar density is tested on a copy machine to determine which one works the best.