Front and back printing on security document substrates

    公开(公告)号:US09962951B2

    公开(公告)日:2018-05-08

    申请号:US15291573

    申请日:2016-10-12

    Abstract: Techniques are described for printing on front and back surfaces of security document substrates in a manner that conserves use of print ribbon, thereby extending the life of the print ribbon. In general, the printer controller knows the content, as well as locations and colors, of what has been printed on the front or first surface of the security document substrate. The printer control also knows the content, as well as locations and colors, of what is to be printed on the back or second surface of the security document substrate. When the back surface of the substrate is to be printed, the printer controller determines, for a particular color, whether any of the printing on the back surface would overlap with the printing on the front surface. For locations where there would be no overlap, the printer can reuse the section of print ribbon that was used to print on the front surface to print on the back surface.

    RIBBON SUPPLY MOUNTING
    83.
    发明申请

    公开(公告)号:US20170136795A1

    公开(公告)日:2017-05-18

    申请号:US15349719

    申请日:2016-11-11

    CPC classification number: B41J33/16 B65H75/10 B65H75/185

    Abstract: A mounting of a ribbon supply on a re-useable cartridge is described where the mounting is designed so that the supply friction, supply and control of the ribbon supply are substantially independent of the cartridge. When the supply rolls are initially mounted on the cartridge, the supply rolls are frictionally engaged with the cartridge to reduce the tendency for the supply rolls to rotate or move prior to being loaded into the printer, which would loosen the ribbon material by unwinding, thereby reducing slack in the ribbon material. When the cartridge is loaded into a card personalization machine, features on the card personalization machine automatically reduce the frictional engagement between the supply rolls and the cartridge, permitting the supply rolls to rotate substantially freely relative to the cartridge so that the supply friction, supply and control are substantially independent of the cartridge.

    FRONT AND BACK PRINTING ON SECURITY DOCUMENT SUBSTRATES

    公开(公告)号:US20170106665A1

    公开(公告)日:2017-04-20

    申请号:US15291573

    申请日:2016-10-12

    Abstract: Techniques are described for printing on front and back surfaces of security document substrates in a manner that conserves use of print ribbon, thereby extending the life of the print ribbon. In general, the printer controller knows the content, as well as locations and colors, of what has been printed on the front or first surface of the security document substrate. The printer control also knows the content, as well as locations and colors, of what is to be printed on the back or second surface of the security document substrate. When the back surface of the substrate is to be printed, the printer controller determines, for a particular color, whether any of the printing on the back surface would overlap with the printing on the front surface. For locations where there would be no overlap, the printer can reuse the section of print ribbon that was used to print on the front surface to print on the back surface.

    SECURE PRINTING USING SLICED DATA
    86.
    发明申请
    SECURE PRINTING USING SLICED DATA 有权
    使用SLIED数据安全打印

    公开(公告)号:US20160023473A1

    公开(公告)日:2016-01-28

    申请号:US14808661

    申请日:2015-07-24

    Inventor: Ken C. Fischer

    CPC classification number: B41J2/325 B41J13/12 B41M3/14 B42D25/30

    Abstract: An image to be printed on a surface of a substrate that forms, or will be used in, a personalized security document is generated. The image to be printed is then sliced, divided, separated, etc. into a plurality of separate image portions. Each of the separate image portions is then printed onto the substrate. Together, the separate printed image portions form the desired image on the substrate. Each image portion contains only a portion of any confidential or personal information. Each separate image portion is printed using separate sections of a single print ribbon. Since each image portion is printed using a different section of the print ribbon, each ribbon section contains only a portion of any confidential or personal information. This makes it difficult for someone to obtain the confidential or personal information from just a brief or casual glance at the used print ribbon.

    Abstract translation: 产生要形成或将要用于个性化安全文档的基板表面上的图像。 然后将要打印的图像切片,分割,分离等成多个单独的图像部分。 然后将每个单独的图像部分印刷到基底上。 一起,单独的印刷图像部分在基板上形成期望的图像。 每个图像部分只包含一部分任何机密或个人信息。 使用单个打印色带的单独部分打印每个单独的图像部分。 由于每个图像部分使用打印色带的不同部分进行打印,所以每个色带部分仅包含一部分任何机密或个人信息。 这使得人们难以从简单或轻蔑地浏览使用过的打印色带获取机密或个人信息。

    METHOD FOR DETERMINING PIXEL DROPOUT
    87.
    发明申请
    METHOD FOR DETERMINING PIXEL DROPOUT 有权
    确定像素流失的方法

    公开(公告)号:US20150314623A1

    公开(公告)日:2015-11-05

    申请号:US14796210

    申请日:2015-07-10

    Abstract: A technique is described for determining pixel dropout in a printhead that has a plurality of print elements arrayed along an axis. In the technique, a dataset of integrated intensity values, in the printing direction on a substrate, of a captured image is generated and used to determine if pixel dropout has or may have occurred.

    Abstract translation: 描述了一种用于确定具有沿轴线排列的多个打印元件的打印头中的像素偏移的技术。 在该技术中,生成捕获图像在基板上的打印方向上的积分强度值的数据集,并用于确定像素丢失是否已经发生或可能已经发生。

    Remote asynchronous key entry
    88.
    发明授权

    公开(公告)号:US11856088B2

    公开(公告)日:2023-12-26

    申请号:US17190084

    申请日:2021-03-02

    CPC classification number: H04L9/0825 H04L9/0877 H04L9/0894 H04L9/14

    Abstract: Methods and systems for remote, asynchronous key entry and extraction are provided. A credential device can store a first key thereon, and can store an encrypted key component. A hardware security module manages a key template including a plurality of key components. The hardware security module manages a complementary key to the first key. The key component on the credential device can be encrypted with the first key for storage on the credential device and decrypted by the complementary key at the hardware security module. Alternately, the key component can be encrypted with the complementary key and provided to the credential device for decryption at a secure system via the first key. Accordingly, a key custodian may supply or extract a key component at a hardware security module remotely and at a time convenient to that key custodian.

Patent Agency Ranking