Abstract:
A method, non-transitory computer readable medium, and apparatus for communicating a command to a networked device that requires a driver via an endpoint device that does not have the driver installed are disclosed. For example, the method establishes a first connection with virtual device server, establishes a second connection with a universal device driver API server, transmits a command to the universal device driver API server, receives a translated command compatible with the driver of the networked device from the virtual device server, wherein the translated command is received by the virtual device server from the driver that is called by the universal device driver API server, establishes a third connection with the networked device using identical connection information associated with the second connection with the virtual device server and transmits the translated command to the networked device over the third connection.
Abstract:
Methods and systems receive an electronic scanned image generated by activity of an application running on a portable computerized device, and calculate a cryptographic digest from data of the electronic scanned image using a second computerized device. Also, such methods and systems encrypt the cryptographic digest using an encryption key stored on the portable computerized device to create a content signature of the cryptographic digest, and send the content signature to the second computerized device. The authenticity of a copy of the electronic scanned image provided by the second computerized device is verified by recalculating the content signature (based on the copy of the electronic scanned image) using the encryption key from the portable device.
Abstract:
A method, non-transitory computer readable medium, and apparatus for communicating a command to a networked device that requires a driver via an endpoint device that does not have the driver installed are disclosed. For example, the method establishes a first connection with virtual device server, establishes a second connection with a universal device driver API server, transmits a command to the universal device driver API server, receives a translated command compatible with the driver of the networked device from the virtual device server, wherein the translated command is received by the virtual device server from the driver that is called by the universal device driver API server, establishes a third connection with the networked device using identical connection information associated with the second connection with the virtual device server and transmits the translated command to the networked device over the third connection.
Abstract:
Methods and devices detect a near field communication (NFC) from a near field wireless communication device of an external computerized device, using an apparatus near field wireless communication device. Based on detecting the NFC, the methods/devices generate random identification and security codes, transmit the identification code and the security code from the apparatus near field wireless communication device to the device near field wireless communication device, and place the previously inactive apparatus wide-range wireless communication device in an active state. In response, the method receives the security code from a wide-range wireless communication device of the external computerized device using the apparatus wide-range wireless communication device. Then the method establishes a network communication session only between the external computerized device and the apparatus based on receiving the security code.
Abstract:
Methods and systems receive location identification tokens from transmitters using a portable computerized device. A first location identification token is received from a first location transmitting device, while the portable computerized device is within a predetermined distance from a designated location. A second location identification token is received from a second location transmitting device. A current location signature is calculated using the first and second location identification tokens. A previously stored location signature associated with the first and second location identification tokens is obtained from a computer readable storage medium. The current location signature is compared with the previously stored location signature to determine a similarity measure. The location identification tokens and the current location signature are stored in a memory and transmitted to a server. The presence of the portable computerized device at the designated location is verified based on the location identification tokens and the current location signature.
Abstract:
A method and system for pairing devices comprises transmitting a plurality of communication signals from each of a plurality of devices and setting an initial threshold vector of signal strengths as a current threshold vector of signal strengths for at least one target device selected from among the plurality of devices. The embodiment includes pairing at least one client device with the at least one target device when a measured vector of signal strengths exceeds the current threshold vector of signal strengths and adjusting the current threshold vector of signal strengths according to the pairing between the client device and the target device, thereby adaptively adjusting the current threshold vector of signal strengths.
Abstract:
Systems and methods for verifying physical proximity to a network device are provided. The method includes acquiring a tag identifier from a tag fixed in, on, or proximal to a network device, using a computing device. The tag is configured to be read and written to by electronic communication with the computing device, when the computing device is disposed in proximity to the tag. The method further includes transmitting data indicative of the tag identifier to a server, and receiving an authorization confirmation from the server. The method also includes rewriting the tag so as to replace the tag identifier with a new tag identifier, using the computing device, and performing one or more operations with the network device after receiving the authorization.
Abstract:
A method, non-transitory computer readable medium, and apparatus for incorporating additional content in a document at a time of processing are disclosed. For example, the method initiates a request to process a document, receives an option to include one or more additional content to the document, selects at least one additional content to add to the printed document from the endpoint device at the time of processing, defines at least one access control of the at least one additional content and sends the request to process the document, wherein the at least one additional content is incorporated into the document that is processed and the at least one additional content has the at least one access control.
Abstract:
Methods and systems for transparently extending a multi-function device onto a mobile communications device. The mobile communications device and the multi-function device can be securely connected utilizing a random code displayed on a user interface of the MFD. An extensibility application associated with the MFD can be transparently combined with an execution environment of the mobile communications device to offer a number of services. A hardware and software resource of the MFD and the mobile communications device can be combined to perform composite operations involving data from both devices. The connection can expire after a period of inactivity and require physical proximity to be established to prevent unwanted access to the MFD. Such an approach establishes a shared extensibility framework for the multifunction device and the mobile communications device as a single execution environment.
Abstract:
Methods and systems receive an electronic scanned image generated by activity of an application running on a portable computerized device, and calculate a cryptographic digest from data of the electronic scanned image using a second computerized device. Also, such methods and systems encrypt the cryptographic digest using an encryption key stored on the portable computerized device to create a content signature of the cryptographic digest, and send the content signature to the second computerized device. The authenticity of a copy of the electronic scanned image provided by the second computerized device is verified by recalculating the content signature (based on the copy of the electronic scanned image) using the encryption key from the portable device.