Abstract:
The present invention is directed to a system for and method of generating image annotation information comprising selecting images to be annotated, analyzing said selected images to identify associated information, generating annotation information from at least one of said selected images using said associated information, and annotating said selected images with the annotation information.
Abstract:
Document management system includes a composite document (CD) and a mixed workflow, which includes an unordered stage followed by one of i) an ordered stage or ii) another unordered stage. The system includes a map-file (map) of the document (CD) for a participant (P) in the mixed workflow that is associated with the ordered or other unordered stage, and a wrap (W) of the map-file (map). Wrap (W) includes a number of map-file fragments (F) equal to or greater than a number of workflow participants (P) within a group (G) associated with the unordered stage. The number of map-file fragments (F) renders the document (CD) inaccessible to the participant (P) that is associated with the ordered or other unordered stage until each of the number of map-file fragments (F) is released by each of the workflow participants (P) within the group (G).
Abstract:
The present disclosure is directed to method and systems of sorting print jobs for assignment to a plurality of printers having different printing characteristics. Print jobs can be received, sorted based on the print parameters of the print jobs, combined into print job groupings based on printing prioritizations, and sent to a plurality of printers having printing configurations that achieve the print parameters and the printing prioritizations.
Abstract:
A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data therein, and transmitting a portion of the deterrent data from a subset of the glyphs without transmitting deterrent data from a remainder of the glyphs. The glyphs form a predetermined structure with a single solution. The method further includes receiving the portion of the deterrent data, placing the portion of the deterrent data into the subset of the glyphs, and solving the predetermined structure with the single solution, thereby determining the remainder of the glyphs to be infilled in the predetermined structure with deterrent data gleaned from the solution.
Abstract:
A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of blocks in a progressive barcode. The method and apparatus including, encoding information of a first data element within the matrix using black modules and, encoding information of a second data element within the matrix using color modules. The barcode being configured to be overprinted as it progresses through progressive states. The progressive barcode, resulting from the overprinting through the progressive states, masking the ability to conclusively determine the barcode in a previous state.
Abstract:
An identification mark may have a calibration color, a predetermined authentication color, and a predetermined difference between the calibration color and the predetermined authentication color that is associated with a product; and a visual code with a mechanism that identifies the predetermined difference.
Abstract:
An embodiment provides a method for compression of a real-time surveillance signal. This method includes receiving a signal from a monitoring device and analyzing the signal to be monitored to compute spectral content of the signal. This method also includes computing the information content of the signal and determining a count of a number of coefficients to be used to monitor the signal. This method includes deploying a strategy for computing a plurality of coefficients based on the spectral content of the signal and the count of the number of coefficients to be used for monitoring the signal. This method further includes monitoring the signal and resetting the system in the case of above-threshold changes in a selected portion of the plurality of coefficients.
Abstract:
Method for security printing. A digital model of a feature for printing is received, wherein the feature is for authentication by an external device. Deviation from the digital model is compensated for, to a printed instance of the feature.
Abstract:
A soft proof system includes a display module and a manager. The display module displays a visual representation of a print product, and a color array expressing a tolerance range of a color component of the visual representation and a target color within the range. Via the manager, a visualization function produces the visual representation and the color array according to a soft proof array. A tolerance selection function, associated with the display module, enables selection of the tolerance range for at least a portion of the print product, wherein the selection is expressed on the display in the visual representation and in the color array.
Abstract:
A document registry system (10) includes a registry database (20) with a specific task sub-database (22) and an analytics-supporting general task sub-database (24). The sub-databases (22, 24) include i) pre-existing fields configured to store, respectively, specific task-related and analytics-related document data received from one or more of a plurality of sources (S1, S2, S3, S4) or from a source (NS1, NS2) other than the plurality of sources (S1, S2, S3, S4), and ii) de novo fields configured tote generated as a result of, respectively, a specific task query and a general task query and configured to store, respectively, specific task-related and general task-related document data received from source(s) (NS1, NS2) other than the plurality of sources (S1, S2, S3, S4). A query mapping engine (26) is configured to receive a request entry, map the request entry into a query, and actively collect data based upon the query. Data is collected from the specific task sub-database (22) or the analytics-supporting general task sub-database (24), and from the source(s) (NS1, NS2) other than the plurality of sources (S1, S2, S3, S4).