Abstract:
An image forming apparatus includes a housing having a front section and a rear section, a user interface including a display and disposed at the front section and not at the rear section, a first port disposed at the front section within which the display is completely included, and a second port disposed at the rear section. The front and rear sections are defined by imaginarily dividing the housing in half and located opposite to each other in a front-rear direction. When a second USB device that is not a particular USB device is attached to the second port for a first USB device that is the particular USB device, cause the user interface to display a notification screen corresponding to that the second USB device is attached to the second port.
Abstract:
An information processing apparatus includes plural communication units, a determination unit, and a controller. The communication units are configured to conduct a wireless communication at different communication speeds. The determination unit is configured to determine a communication unit having a faster communication speed in order to transmit or receive an encrypted communication object. The controller is configured to perform a control to start a communication by the communication unit determined by the determination unit.
Abstract:
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
Abstract:
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
Abstract:
The invention provides a method for impeding making a useful copy with an optical recording device of video content displayed on a screen, wherein the method comprises displaying the video content on the screen, illuminating with ambience light of an ambience light source the screen, the ambience light comprises light having a wavelength in the visible part of the spectrum, wherein the ambience light is controlled as function of the video content, and wherein the ambience light is intensity modulated with an intensity modulation having an intensity modulation frequency selected from the range of 40 Hz to 500 Hz.
Abstract:
A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
Abstract:
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
Abstract:
The invention provides a method for impeding making a useful copy with an optical recording device of video content displayed on a screen, wherein the method comprises displaying the video content on the screen, illuminating with ambience light of an ambience light source the screen, the ambience light comprises light having a wavelength in the visible part of the spectrum, wherein the ambience light is controlled as function of the video content, and wherein the ambience light is intensity modulated with an intensity modulation having an intensity modulation frequency selected from the range of 40 Hz to 00 Hz.
Abstract:
A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.
Abstract:
A document printing system may include a print engine, a controller coupled to the print engine and a communication port in electrical communication with the controller. The communication port can read a portable memory device, which stores an electronic secure file for authorizing the print engine. The portable memory device may store data such as the device identification code, the vendor identification code, the creation date for the electronic secure file. The electronic secure file may also store the device identification code, the vendor identification code, the creation date for the file itself, as well as a balance amount. The system may authorize a print engine by comparing the data in the electronic secure file and data stored on the portable memory device. If the comparison of data finds a mismatch, the system may determine that the print engine is not authorized; or that the service is authorized if otherwise.