WO2008154381A1 - Encoded data security mechanism - Google Patents
Encoded data security mechanism Download PDFInfo
- Publication number
- WO2008154381A1 WO2008154381A1 PCT/US2008/066119 US2008066119W WO2008154381A1 WO 2008154381 A1 WO2008154381 A1 WO 2008154381A1 US 2008066119 W US2008066119 W US 2008066119W WO 2008154381 A1 WO2008154381 A1 WO 2008154381A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- encoded data
- hardcopy printout
- request
- printout
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
Definitions
- a method for securing and tracing confidential information is described.
- document output instructions for the request are generated.
- Particular data is then determined to associate with the document output instructions.
- Such data may include user specific information, such as a name or operator number, document specific information, such as an indicia as to what type of content is being printed, and/or session specific data, such as the time and date of the request or a terminal device number from which the request came.
- the data is then encoded with the generated document output instructions.
- This encoded data and output document instructions may then be sent to a printer driver where a hardcopy printout is generated of the desire content and the encoded data.
- the encoded data includes information specific to a terminal device associated with the request to print.
- the encoded data may appear as at least three representations of noise on the hardcopy printout and include an identifier representative of a starting position for reading the encoded data.
- different components such as a printer, a terminal device, such as a user's computer, and/or a server may be configured with one or more software modules to encode data associated with a print request with the content to be printed.
- Still another aspect of the present invention includes a network system of computers, servers, and printers, where data is encoded with hardcopy printouts.
- Figure 1 illustrates a schematic diagram of a general-purpose digital computing environment in which certain aspects of the present invention may be implemented
- Figure 2 is a flow chart of an illustrative method for encoding a hardcopy printout in accordance with at least one aspect of the present invention
- Figures 3 A and 3 B are illustrative diagrams of communications between computer- related devices in accordance with at least one aspect of the present invention.
- Figures 4A-4C are illustrative examples of encoded hardcopy printouts in accordance with at least one aspect of the present invention.
- Figure 5 is a flow chart of an illustrative method for reading hardcopy printouts in accordance with at least one aspect of the present invention
- Figure 6 is an illustrative diagram of communications between computer-related devices in accordance with at least one aspect of the present invention.
- Figure 7 is an illustrative diagram of a comparison between a hardcopy printout and a read hard copy printout in accordance with at least one aspect of the present invention.
- FIG. 1 illustrates an example of a suitable computing system environment 100 that may be used according to one or more illustrative embodiments of the invention.
- the computing system environment 100 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing system environment 100 be interpreted as having any dependency nor requirement relating to any one or combination of components illustrated in the exemplary computing system environment 100.
- the invention is operational with numerous other general purpose or special purpose computing system environments or configurations.
- Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, personal computers, server computers, handheld or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
- the invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer.
- program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote computer storage media including memory storage devices.
- the computing system environment 100 may include a computer 101 having a processor 103 for controlling overall operation of the computer 101 and its associated components, including RAM 105, ROM 107, input/output module 109, and memory 115.
- Computer 101 typically includes a variety of computer readable media.
- Computer readable media can be any available media that can be accessed by computer 101 and include both volatile and nonvolatile media, removable and non-removable media.
- Computer readable media may comprise computer storage media and communication media.
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, random access memory (RAM), read only memory (ROM), electronically erasable programmable read only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 101.
- Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
- RAM 105 may include one or more are applications representing the application data stored in RAM memory 105 while the computer is on and corresponding software applications (e.g., software tasks), are running on the computer 101.
- Input/output module 109 may include a microphone, keypad, touch screen, and/or stylus through which a user of computer 101 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual and/or graphical output.
- Software may be stored within memory 115 and/or storage to provide instructions to processor 103 for enabling computer 101 to perform various functions.
- memory 115 may store software used by the computer 101, such as an operating system 117, application programs 119, and an associated database 121.
- some or all of computer 101 's computer executable instructions may be embodied in hardware or firmware (not shown).
- the database 121 may provide centralized storage of account information and account holder information for the entire business, allowing interoperability between different elements of the business residing at different physical locations.
- Computer 101 may operate in a networked environment supporting connections to one or more remote computers, such as branch terminals 141 and 151.
- the branch computers 141 and 151 may be personal computers or servers that include many or all of the elements described above relative to the computer 101.
- the network connections depicted in Figure 1 include a local area network (LAN) 125 and a wide area network (WAN) 129, but may also include other networks.
- LAN local area network
- WAN wide area network
- computer 101 When used in a LAN networking environment, computer 101 is connected to the LAN 125 through a network interface or adapter 123.
- the server 101 may include a modem 127 or other means for establishing communications over the WAN 129, such as the Internet 131.
- network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
- the existence of any of various well-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like is presumed, and the system can be operated in a client-server configuration to permit a user to retrieve web pages from a web-based server.
- Any of various conventional web browsers can be used to display and manipulate data on web pages.
- an application program 119 used by the computer 101 may include computer executable instructions for invoking user functionality related to communication, such as email, short message service (SMS), and voice input and speech recognition applications.
- SMS short message service
- Terminals 141 or 151 may also be mobile terminals including various other components, such as a battery, speaker, and antennas (not shown).
- Input/output module 109 may include a user interface including such physical components as a voice interface, one or more arrow keys, joystick, data glove, mouse, roller ball, touch screen, or the like.
- input/output module 109 may also include a reader/scanner to read/scan deposit items, including monetary items, to identify the type of monetary item it is.
- readers/scanner may read magnetic ink character recognition (MICR) data and/or other data from the monetary items for identification of the type of monetary item.
- MICR magnetic ink character recognition
- FIG. 2 is a flow chart of an illustrative method for encoding a hardcopy printout in accordance with at least one aspect of the present invention.
- the process starts and at step 201, a user selects a document or screen print function to initiate generation of a hardcopy printout.
- a printout in the form of physical paper
- a print request to print as a PDF file may also be utilized in accordance with one ore more aspects of the present invention.
- a print subprogram associated with the terminal device of the user is initiated.
- Printer interface software encodes specific information in some form for eventual output onto the hardcopy printout at step 205.
- the form for the encoded specific information may take any of a number of different forms.
- an indicium such as a graphical glyph may be utilized to maintain the encoded data.
- the glyph may be a logo of an entity, a general header, or some other indicia.
- white noise may appear on the hardcopy printout as described in further detail below.
- combinations of glyphs and noise may be utilized as explained more fully below.
- Such specific information may include, but is not limited to, user specific data, session specific data, and/or document specific data.
- User specific data may include a name of the user associated with a user profile being run on the requesting terminal device.
- user specific data may include a code number associated with the user of the terminal device, a password associated with the user of the terminal device, and/or an operator title or other type of user specific data.
- Session specific data may include data regarding the session itself.
- session specific data may include the date and/or time when a print request was initiated. It may include data on a server that processed the request, or the terminal device that sent the request, or the type of content file, such as a screen shot of a display of the terminal device compared to a word processing program, a place where the hardcopy was printed, a department location for the printout, and/or other types of session specific data.
- data may include information regarding other application programs that were open, i.e., active, on the operating system of terminal device that requested the hardcopy printout. Such information may be helpful in identifying if someone is attempting to "cut and paste" highly confidential information from one program to another before printing.
- Document specific data may include any type of data associated with the document to be printed.
- document specific data may include information regarding the author of the document being requested to print, the application program associated with the content of the hardcopy printout request, and/or a sensitivity code associated with the document file that identifies a level of confidentiality associated with the document.
- a document file may include customer social security numbers. Such information may be deemed highly confidential and, as such, may ensure that the document has a sensitivity code of very highest for it. As such, if such a document file were ever printed, in accordance with one or more aspects of the present invention, encoded data may be included with the hardcopy printout indicating that the content of the hardcopy printout is of a highly sensitive nature due to confidential information being included.
- the specific information to associate with the document output instructions may be determined. For example, procedures may be configured to identify the user associated with the request for the hardcopy printout. A determination may be made to ascertain whether that person is authorized to print a hardcopy without the need to include encoded data at all. Alternatively, in another example a determination may be made as to what data to encode for that particular person. A new employee may have more specific data encoded than a veteran of the company may. These and other types of determinations may be made to ensure that desired and/or proper data is encoded.
- step 207 the encoded specific information from step 205 is overlaid on the document output instructions sent to a printer.
- the encoded specific information may be sent separate from the document output instructions or may be sent with them.
- the encoded specific information e.g., data
- the encoded specific information may be processed with the document output instructions to be integrated within the document or instructions or may be included separate from, but at the same time as the document output instructions.
- a hardcopy printout is generated to include the content desired to be printed in addition to the encoded specific information.
- the encoded data within the hardcopy printout includes the information specific to the terminal device associated with the request.
- the encoded information is specific to the terminal device associated with the request. It should be understood by those skilled in the art that any of a number of methods may be utilized to encode data onto a hardcopy printout and that the present invention is not so limited to any particular method, even if illustrated herein.
- FIGS 3A and 3B are illustrative diagrams of communications between computer- related devices in accordance with at least one aspect of the present invention.
- a terminal device 301A e.g., computer
- a terminal device 301B e.g., computer
- the request is sent through a server 305.
- one or more software modules resident on one or more of the components may be configured to perform one or more of the operations of receiving requests, generating document output instructions, determining specific information to associate, and encoding the data with the instructions.
- a printer driver residing on a terminal device, server, printer, or intermediary computing device, may be configured to ensure that any or all hardcopy printouts include encoded specific information for securing and being able to trace the hardcopy printouts.
- Any of the components 301, 303, and/or 305 may be configured to keep an addition logging of hardcopy printouts that are made.
- Figures 4A-4C are illustrative examples of encoded hardcopy printouts in accordance with at least one aspect of the present invention.
- Figure 4A illustrates an example hardcopy printout 40 IA.
- Hardcopy printout 40 IA includes a printout of the content 403 A that a user of a terminal device desired to be printed.
- Hardcopy printout 40 IA also includes encoded data 405A.
- encoded data 405A is shown as a glyph in the lower right hand corner of the document page of the hardcopy printout 40 IA.
- One or more of encoded data glyph 405 A may be included on the hardcopy printout 40 IA and one is merely shown for illustrative purposes.
- Encoded data glyph 405 A may appear as many different forms, including a logo of an entity associated with the terminal device and/or printing device, and/or content 403A to be printed. Such an encoded data glyph 405 A may be configured to maintain 20KB or more of data, which is an ample amount for encoding data associated with a terminal device. Encoded data glyph 405A may be generated by microprint. In addition, encoded data may be in a color, thus allowing even more data to be encoded in a hardcopy printout. In an illustrative example, the use of yellow ink may be utilized in the hardcopy printout for the encoded data.
- Figure 4B illustrates an example hardcopy printout 401B.
- Hardcopy printout 401B includes a printout of the content 403B that a user of a terminal device desired to be printed.
- Hardcopy printout 401B also includes encoded data 407B.
- encoded data 407B is shown as various pixels or clusters of pixels that would appear as nothing more than noise to an observer's eye.
- punctuation marks and/or bullets or other typographical markings may be utilized as data carriers.
- the boundaries of these types of markings may be utilized. Such boundaries may be recognizable as an anchor.
- the encoded data noise 407B may be randomly dispersed on one or more pages of the hardcopy printout 40 IB or may be located in one particular location on one or more pages.
- encoded data noise 407B may be configured to be included on a hardcopy printout 40 IB is a particular pattern but appearing to the human eye as being randomly dispersed. Such an illustrative example is described below with respect to Figure 7. Such random dispersion may vary over time to maintain the appearance of random noise, while adhering to the use of multiple pre-set anchor points as seeds for the search illustrated in Figure 7.
- Figure 4C illustrates an example hardcopy printout 401C.
- Hardcopy printout 401C includes a printout of the content 403C that a user of a terminal device desired to be printed.
- Hardcopy printout 401C also includes encoded data 405C and 407C.
- encoded data 405C is shown as a glyph in the lower right hand corner of the document page of the hardcopy printout 401C.
- encoded data glyph 405 C may be included on the hardcopy printout 401C and one is merely shown for illustrative purposes.
- encoded data 407C is shown as various pixels or clusters of pixels that would appear as nothing more than noise to an observer's eye.
- encoded data is included in both glyph form 405C and noise form 407C.
- Hardcopy printout 401A-401C are designed to survive photocopying. As such, even if an individual makes a photocopy of the hardcopy printout, the encoded data remains in the document in order to ensure that the confidential information remains tagged or associated with the encoded data.
- a reader computing device as described below, reads the encoded data and may read the encoded data from a photocopy of the original hardcopy printout even if photocopied many times.
- FIG. 5 is a flow chart of an illustrative method for reading hardcopy printouts in accordance with at least one aspect of the present invention.
- the process starts and at step 501 a hardcopy printout or copy thereof is read, e.g., scanned, to initiate the process to extract encoded data.
- encoded data may correspond to the illustrative examples shown in Figures 4A-4C.
- an associated reader computing device such as a preconf ⁇ gured scanner type device, determines the location of the encoded data.
- the mechanism or tool for reading the encoded data may be software.
- the associated reader computing device may include software in some form to perform the associated functions described herein.
- the associated reader computing device may be preconf ⁇ gured with an indicator of a starting position to begin interpreting the encoded data from the printout.
- the associated reader computing device may be configured to search for and determine the location of the encoded data, whether as a starting position for reading other encoded data or for the encoded data itself.
- the starting location may be ascertained through algorithmic interpretation of the contents of the page to preserve relative locations in the event of scaling, such as enlargement or reduction, of the original. It should be understood by those skilled in the art that a variety of algorithms could be applied, following an approach where more critical data may be stored with a more survivable feature or indicia. Such an example may be in the case of a glyph-logo with richer data being stored in an area that is more obscure and more survivable, such as embedding microprint in the boundaries of shapes, lines, characters, or punctuation.
- the associated reader computing device sends the encoded data to a computing device.
- the computing device may be a CPU within the associated reader computing device and/or may be a computing device external to the associated reader computing device. Whether with the associated reader computing device or external to it, the computing device decodes the encoded data at step 507. Then, as step 509, the decoded encoded data may be used to determine how the information on the hardcopy printout was disseminated. For example, in determining that the hardcopy printout was printed by a "John Smith," Mr. Smith can then be spoken with to determine the circumstances of the hardcopy printout, such as the purpose or reason for printing.
- this step may be used by law enforcement officials or an entity to trace the originals of the hardcopy printout. As such, even if an individual sells, reproduces, or distributes, the hardcopy printout to another, the original person responsible for the printout may be determined to be questioned and/or held responsible. It should be understood by those skilled in the art that any of a number of methods may be utilized to decode encoded data form a hardcopy printout and that the present invention is not so limited to any particular method, even if illustrated herein.
- FIG. 6 is an illustrative diagram 600 of communications between computer-related devices in accordance with at least one aspect of the present invention.
- an associated reader computing device 601 e.g., a scanner
- a computing device 603. Although illustrated in the present example as separate form the associated reader computing device 601, the computing device 603 may be included with the associated reader computing device as well.
- data read by the associated reader computing device 601 is sent to the computing device.
- Computing device 603 decodes the encoded data, such as in step 507 from Figure 5.
- One or more of associated reader computing device 601, computing device 603, and/or server 605 coupled to a network bus 607 then utilizes the decoded encoded data to determine how information on the hardcopy printout or copy thereof that included the encoded data was disseminated.
- one or more software modules resident on one or more of the components may be configured to perform one or more of the operations of receiving reading encoded data, decoding the encoded data, and determining how to use the decoded encoded information.
- Figure 7 is an illustrative diagram of a comparison between a hardcopy printout and a read hard copy printout in accordance with at least one aspect of the present invention.
- Figure 7 illustrates an example of an associated reader computing device being preconf ⁇ gured properly to read encoded data from a hardcopy printout.
- a printer 701 is shown to make a hardcopy printout 703.
- the hardcopy printout 703 included confidential information that should not be removed from an office.
- hardcopy printout 703 is shown to include five glyphs of encoded data 705 1 through 705 5 configured on the hardcopy printout 703.
- glyph 705 1 is a starting position glyph.
- Glyph 705 1 may include an identifier representative of the starting position for reading the encoded data.
- other encoded data on the hardcopy printout 703 may include an identifier of the starting position for reading the encoded data from the hardcopy printout.
- a mathematical method of page analysis may be utilized to produce a consistent starting position for reading encoded data from the page.
- one technique may be for an associated reader computing device to analyze a page for a percentage of black pixels across an overlaid grid. When a page is captured as a black and white image, there is a total pixel count that may be proportioned out to white and black pixels. This also may be computed for a quadrant on the document page. Regardless of the resolution, the proportions would be relatively consistent, provided the document was not altered. The calculation may need to include enough tolerance in the proportion value to account for variation in capture devices and paper marking.
- Another illustrative technique may be to analyze the page for corner proximity to the nearest non-white pixel.
- the distance from each corner to the nearest non-white pixel may be used as numerical values entered into a predetermined algorithm to locate the starting position.
- Still another illustrative technique may be to analyze the page to measure the longest diagonals of non-white pixels in two dimensions and then to compare the lengths of the two diagonals. In such a technique, the document page is scanned at a 45-degree and a 135-degree angle rather than 90- degree left-right and up-down. Such a technique may produce more skew-resistant results.
- Such proportions may be utilized to make an algorithm more resilient against magnification and reduction. Because these are proportional measures (ratio of one diagonal to another), they are resistant to errors induced by magnification and reduction as long as the aspect ratio is maintained. 8:5 is the same as 16:10, for example.
- glyph 705 1 data may be encoded within the glyph 705 1 to indicate that glyph 705 2 includes the next encoded data to be read.
- glyph 705_2 to glyph 705_3, glyph 705_3 to glyph 705_4, and glyph 705_4 to glyph 705_5 data may be encoded within glyphs 705_2, 705_3, and 705_4, respectively, to indicate that glyphs 705_3, 705_4, and 705_5, respectively, includes the next encoded data to be read.
- glyph 705 5 may include data as an identifier that glyph 705 5 is the last glyph to be read.
- a pattern of paths 707 1 to 707 5 is created.
- the pattern may be preconfigured within an associated reader computing device 709 so that the associated reader computing device 709 knows the starting position glyph 705 1 to read from the hardcopy printout.
- the associated reader computing device 709 is configured to read the hardcopy printout 703 from the starting position glyph 705 1.
- the associated reader computing device 709 may read the hardcopy printout 703 until it determines the starting position glyph to begin reading the encoded data.
- associated reader computing device 709 may be configured to start reading from the upper left corner of a hardcopy printout until the starting position glyph is determined.
- associated reader computing device 709 reads the hardcopy printout 703, such as to scan the document.
- a broken line representation 711 of the hardcopy printout 703 is shown.
- the associated reader computing device 709 reads the encoded data glyphs 705 1 to 705 5 from the hardcopy printout 703 in the same pattern 713. As such, all the encoded data, in a proper order, may be read and determined by the associated reader computing device.
- [49] Although shown to include only five glyphs 705 1 to 705 5 to make up the pattern 707 1 to 707 5, it should be understood by those skilled in the art that additional or fewer glyphs may be utilized and/or noise representations may be included.
- the pattern may be configured to include a particular glyph or noise more than once. The use of such multiple identical glyphs may be used to duplicate the payload of data to improve survivability.
- random dispersion may vary over time to further maintain the appearance of random noise, while adhering to the use of multiple pre-set anchor points as seeds for the search illustrated in Figure 7.
- data may be encoded onto a document page based upon the characters and/or ink location of content to be printed onto the document page.
- software associated with a computer, printer, and/or device in between such as a printer server, may be configured to determine where encoded data is placed on a printed page by where content for that document page will be printed. If content is queued to print on a document page in a word processing type application, such as Word by Microsoft ® Corporation of Redmond, Washington, the content may be configured to print with a set margin in place. In one example, a margin of 1 inch around the entire document page may be configured.
- data may be encoded in the margin alone, within the content alone, and/or within both.
- the data may be encoded based upon any of a number of parameters.
- the data may be encoded in the content based upon some parameter, such as the third occurrence of the word "the.”
- the third "the" in the document page are encoded with data.
- data may be encoded within a first occurrence of a doubled letter, such as the "t"s in the word "letter.”
- Still another example includes encoding data in the underlined portion of an underlined word, or in italicized or bolded words. Any of these examples may be a starting position for reading the encoded data.
- the encoded data may be printed to and read from PDF document files as well.
- data even if an individual requests a print job to an Adobe PDF, data still may be encoded onto the rendered PDF document file. Therefore, even if the PDF is then printed at an external printer, the encoded data glyph, noise, combination, and/or pattern is still included within any hardcopy printout of the PDF document file.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MX2009013323A MX2009013323A (en) | 2007-06-09 | 2008-06-06 | Encoded data security mechanism. |
CA002687748A CA2687748A1 (en) | 2007-06-09 | 2008-06-06 | Encoded data security mechanism |
CN200880019448A CN101681416A (en) | 2007-06-09 | 2008-06-06 | Encoded data security mechanism |
EP08770336A EP2156364A1 (en) | 2007-06-09 | 2008-06-06 | Encoded data security mechanism |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/760,750 | 2007-06-09 | ||
US11/760,750 US20080307233A1 (en) | 2007-06-09 | 2007-06-09 | Encoded Data Security Mechanism |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008154381A1 true WO2008154381A1 (en) | 2008-12-18 |
Family
ID=39735393
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/066119 WO2008154381A1 (en) | 2007-06-09 | 2008-06-06 | Encoded data security mechanism |
Country Status (6)
Country | Link |
---|---|
US (1) | US20080307233A1 (en) |
EP (1) | EP2156364A1 (en) |
CN (1) | CN101681416A (en) |
CA (1) | CA2687748A1 (en) |
MX (1) | MX2009013323A (en) |
WO (1) | WO2008154381A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9455992B2 (en) * | 2009-06-12 | 2016-09-27 | Microsoft Technology Licensing, Llc | Trusted hardware component for distributed systems |
WO2011150443A1 (en) * | 2010-05-31 | 2011-12-08 | Silverbrook Research Pty Ltd | Hybrid system for identifying printed page |
KR101770299B1 (en) * | 2011-01-18 | 2017-09-05 | 삼성전자주식회사 | Method and apparatus for transmitting data and method and apparatus for processing data |
US9143628B2 (en) | 2012-08-21 | 2015-09-22 | Ricoh Company, Ltd. | Quality checks for printed pages using target images that are generated external to a printer |
US20150358164A1 (en) * | 2014-06-10 | 2015-12-10 | Unisys Corporation | Systems and methods for qr code validation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6396594B1 (en) * | 1999-03-31 | 2002-05-28 | International Business Machines Corporation | Method for providing flexible and secure administrator-controlled watermarks |
US20020164053A1 (en) * | 1999-06-29 | 2002-11-07 | Seder Phillip Andrew | Methods for opening file on computer via optical sensing |
US6763121B1 (en) | 2000-06-14 | 2004-07-13 | Hewlett-Packard Development Company, L.P. | Halftone watermarking method and system |
GB2411330A (en) * | 2004-02-17 | 2005-08-24 | William John Bailey | A means for document security tracking |
US6983056B1 (en) * | 1999-08-06 | 2006-01-03 | International Business Machines Corporation | Method and device for embedding and detecting watermarking information into a black and white binary document image |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5671277A (en) * | 1992-06-30 | 1997-09-23 | Minolta Camera Kabushiki Kaisha | Image forming apparatus and copy management system |
US6577746B1 (en) * | 1999-12-28 | 2003-06-10 | Digimarc Corporation | Watermark-based object linking and embedding |
US6098882A (en) * | 1996-03-01 | 2000-08-08 | Cobblestone Software, Inc. | Variable formatting of digital data into a pattern |
US7024016B2 (en) * | 1996-05-16 | 2006-04-04 | Digimarc Corporation | Digital watermarking apparatus and methods |
KR100295007B1 (en) * | 1996-06-20 | 2001-10-26 | 포만 제프리 엘 | Data concealment and extraction methods |
JP2000050054A (en) * | 1998-07-31 | 2000-02-18 | Canon Inc | Recording system |
AU2001229402A1 (en) * | 2000-01-13 | 2001-07-24 | Digimarc Corporation | Authenticating metadata and embedding metadata in watermarks of media signals |
US7142689B2 (en) * | 2000-01-31 | 2006-11-28 | Canon Kabushiki Kaisha | Image processing apparatus for determining specific images |
US7191156B1 (en) * | 2000-05-01 | 2007-03-13 | Digimarc Corporation | Digital watermarking systems |
US6360001B1 (en) * | 2000-05-10 | 2002-03-19 | International Business Machines Corporation | Automatic location of address information on parcels sent by mass mailers |
US7268906B2 (en) * | 2002-01-07 | 2007-09-11 | Xerox Corporation | Systems and methods for authenticating and verifying documents |
US7197644B2 (en) * | 2002-12-16 | 2007-03-27 | Xerox Corporation | Systems and methods for providing hardcopy secure documents and for validation of such documents |
EP1614064B1 (en) * | 2003-04-16 | 2010-12-08 | L-1 Secure Credentialing, Inc. | Three dimensional data storage |
US7225977B2 (en) * | 2003-10-17 | 2007-06-05 | Digimarc Corporation | Fraud deterrence in connection with identity documents |
US20050259289A1 (en) * | 2004-05-10 | 2005-11-24 | Sharp Laboratories Of America, Inc. | Print driver job fingerprinting |
US20060112017A1 (en) * | 2004-11-22 | 2006-05-25 | George Koppich | System and method for auditing an electronic document trail |
US7756826B2 (en) * | 2006-06-30 | 2010-07-13 | Citrix Systems, Inc. | Method and systems for efficient delivery of previously stored content |
US7697714B2 (en) * | 2005-09-19 | 2010-04-13 | Silverbrook Research Pty Ltd | Associating an object with a sticker and a surface |
EP1791080A1 (en) * | 2005-11-23 | 2007-05-30 | Neopost S.A. | Finding markings on a document |
-
2007
- 2007-06-09 US US11/760,750 patent/US20080307233A1/en not_active Abandoned
-
2008
- 2008-06-06 CA CA002687748A patent/CA2687748A1/en not_active Abandoned
- 2008-06-06 MX MX2009013323A patent/MX2009013323A/en active IP Right Grant
- 2008-06-06 WO PCT/US2008/066119 patent/WO2008154381A1/en active Application Filing
- 2008-06-06 CN CN200880019448A patent/CN101681416A/en active Pending
- 2008-06-06 EP EP08770336A patent/EP2156364A1/en not_active Ceased
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6396594B1 (en) * | 1999-03-31 | 2002-05-28 | International Business Machines Corporation | Method for providing flexible and secure administrator-controlled watermarks |
US20020164053A1 (en) * | 1999-06-29 | 2002-11-07 | Seder Phillip Andrew | Methods for opening file on computer via optical sensing |
US6983056B1 (en) * | 1999-08-06 | 2006-01-03 | International Business Machines Corporation | Method and device for embedding and detecting watermarking information into a black and white binary document image |
US6763121B1 (en) | 2000-06-14 | 2004-07-13 | Hewlett-Packard Development Company, L.P. | Halftone watermarking method and system |
GB2411330A (en) * | 2004-02-17 | 2005-08-24 | William John Bailey | A means for document security tracking |
Also Published As
Publication number | Publication date |
---|---|
MX2009013323A (en) | 2010-01-20 |
CA2687748A1 (en) | 2008-12-18 |
EP2156364A1 (en) | 2010-02-24 |
CN101681416A (en) | 2010-03-24 |
US20080307233A1 (en) | 2008-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190005268A1 (en) | Universal original document validation platform | |
US9036180B2 (en) | Apparatus and method for securing confidential information of printed document in cloud computing environment | |
US9864920B2 (en) | Semiautomatic multifunction device-based validation of secure documents | |
US11087426B2 (en) | System and method for digital watermarking | |
EA034354B1 (en) | System and method for document information authenticity verification | |
US20060168659A1 (en) | Security information estimating apparatus, a security information estimating method, a security information estimating program, and a recording medium thereof | |
US20190188821A1 (en) | System and Method for Digitally Watermarking Digital Facial Portraits | |
US9864906B2 (en) | Method and system for creating a validation document for security | |
CA2504299A1 (en) | System and method for decoding digital encoded images | |
US20190172172A1 (en) | System and Method for Digital Watermarking | |
US10855868B1 (en) | Systems, processes, and computer program products for detecting and verifying invisible information in documents | |
US20210073369A1 (en) | Tampering detection method and apparatus and non-transitory computer-readable storage medium | |
JP6678508B2 (en) | Method and system for applying a content variable watermark to a document | |
US20080307233A1 (en) | Encoded Data Security Mechanism | |
CN108446543B (en) | Mail processing method, system and mail proxy gateway | |
US20180300545A1 (en) | System and Method for Digitally Watermarking Digital Facial Portraits | |
US9682590B1 (en) | Printed document security | |
US11157639B2 (en) | Systems, processes, and computer program products for authentication of documents based on invisible information in documents | |
US9088735B2 (en) | Computer-based system and method for adding variable security data in printing operations | |
KR102138077B1 (en) | System and method for preventing forgery and alteration of documents | |
JP4895696B2 (en) | Information processing apparatus, information processing method, and information processing program | |
RU2699234C1 (en) | Method of safe use of an electronic document | |
Mantoro et al. | Real-time printed document authentication using watermarked qr code | |
JPH06305200A (en) | Printer and printing verification device for electronic approval information | |
TW202105296A (en) | Anti-counterfeiting method and system for seal and stamp wherein the seal and stamp anti-counterfeiting system includes a client communication device and a bank server system to ensure data integrity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880019448.0 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08770336 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2687748 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008770336 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2009/013323 Country of ref document: MX |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 44/CHENP/2010 Country of ref document: IN |