Abstract:
A method for printing a document from a mobile device includes identifying a document to be printed and generating a notification comprising a selection of at least one candidate print device that may be selected for printing. The notification may be generated by analyzing, by one or more mobile device applications, the document to be printed to identify a document context including a security level of the identified document; using data sensed by one or more mobile device sensors to identify a user context including at least a current geographical location of the user; using the user context to detect a print device near the geographical location of the user; and accessing a rule set to determine if the identified document can be printed on the detected print device based on the security level of the identified document; and causing a user interface to output the notification.
Abstract:
Methods and systems receive location identification tokens from transmitters using a portable computerized device. A first location identification token is received from a first location transmitting device, while the portable computerized device is within a predetermined distance from a designated location. A second location identification token is received from a second location transmitting device. A current location signature is calculated using the first and second location identification tokens. A previously stored location signature associated with the first and second location identification tokens is obtained from a computer readable storage medium. The current location signature is compared with the previously stored location signature to determine a similarity measure. The location identification tokens and the current location signature are stored in a memory and transmitted to a server. The presence of the portable computerized device at the designated location is verified based on the location identification tokens and the current location signature.
Abstract:
A method, non-transitory computer readable medium and apparatus for analyzing operational sensor data of a device collected by a mobile endpoint device operating with the device are disclosed. For example, the method includes receiving the operational sensor data, a time stamp, a location of the device and a device identification (ID) from the mobile endpoint device, wherein the operational sensor data is collected by the mobile endpoint device from the device when the mobile endpoint device initiates a communication session with the device and transmitting the operational sensor data to a management service, wherein the operational sensor data is analyzed to determine a cause of a failure of the device when the device fails.
Abstract:
A system and method for transmitting visual data by displaying a synchronization video that includes synchronization code sequences on a first device, capturing the synchronization video using a video camera of a second device, parsing and decoding the synchronization code sequences on the second device, displaying an indication of which of the synchronization code sequences are compatible for visual data transmission on the second device, receiving a selected synchronization code sequence of the synchronization code sequences on the first device, and displaying a data code sequence corresponding to the selected synchronization code sequence on the first device, wherein the data code sequence includes encoded data, and capturing and decoding the data code sequence on the second device.
Abstract:
Systems and methods for secured printing are provided. The method includes receiving a nominally print-ready document with the nominally print-ready document including one or more references to one or more security elements. The method also includes replacing the one or more references with one or more identifiers, to generate an intermediate document, and associating the one or more security elements with the one or more identifiers. The method further includes transmitting instructions to a printing device, with the instructions being configured to cause the printing device to associate the one or more identifiers with the one or more security elements. The operations further include transmitting the intermediate document to the printing device.
Abstract:
Systems and methods for tracking large deployments of managed devices in a facility are disclosed. A tracking system is embedded into the managed devices, which may include, for example, printers, copiers, scanners, and multi-function devices (MFD). Location information is generated and maintained using an external server, and when a deployment location check event is triggered, a user of the device is prompted to confirm its deployment location and/or update its location information.
Abstract:
Systems and methods for tracking large deployments of managed devices in a facility are disclosed. A tracking system is embedded into the managed devices, which may include, for example, printers, copiers, scanners, and multi-function devices (MFD). Location information is generated and maintained using an external server, and when a deployment location check event is triggered, a user of the device is prompted to confirm its deployment location and/or update its location information.
Abstract:
A method, non-transitory computer readable medium, and apparatus for preventing reproduction of secure data on a multi-function device are disclosed. The method may be performed by a processor of a multi-function device. For example, the method receives a request to reproduce a document, calculates a perceptual hash of the document, transmits the perceptual hash of the document to a server, receives a control signal to halt reproduction of the document on the printing device in response to a perceptual hash of the secure data stored on the server matching at least a portion of the perceptual hash of the document, and halts the reproduction of the document on the printing device in response to the control signal.
Abstract:
A method, non-transitory computer readable medium, and apparatus for preventing reproduction of secure data on a multi-function device are disclosed. The method may be performed by a processor of a multi-function device. For example, the method receives a request to reproduce a document, calculates a perceptual hash of the document, transmits the perceptual hash of the document to a server, receives a control signal to halt reproduction of the document on the printing device in response to a perceptual hash of the secure data stored on the server matching at least a portion of the perceptual hash of the document, and halts the reproduction of the document on the printing device in response to the control signal.
Abstract:
A system server includes a memory and a processor in communication with the memory. The processor is configured to process a request to lower a security level of one or more communication channels of a secure communication system, where the request is responsive to a problem in the secure communication system. The processor is also configured to generate a message to inform connected devices associated with the one or more communication channels that the security level is to be lowered. The processor is further configured to lower the security level. The processor is further configured to commence a timer to control an amount of time that the security level is to remain lowered.