摘要:
A method for implementing a secure printing campaign to thwart counterfeiting is provided. The method includes the steps of selecting a first secure print technology and a second secure print technology that is distinct from the first secure print technology, selecting a first secure print variable for the first secure print technology and a second secure print variable for the second secure print technology, and establishing a first plurality of discrete values for the first secure print variable and a second plurality of discrete values for the second secure print variable.
摘要:
A reading device reads ambiguous target elements of an authentication target printed on a medium. Each ambiguous target element has a number of different manners by which the ambiguous target element can be interpreted by the reading device. The authentication target as read by the reading device is compared against an authentication signature of the reading device. The authentication signature specifies for each ambiguous target element an expected manner by which the reading device interprets the ambiguous target element as one of the different manners by which the ambiguous target element can be interpreted. Where the authentication target as read by the reading device matches the authentication signature of the reading device, the reading device is signaled as having passed authentication.
摘要:
Systems, methodologies, media, and other embodiments associated with electrocardiogram electrode characterization and compensation are described. One exemplary system embodiment includes a characterization logic configured to generate signals designed to facilitate characterizing an electrocardiogram electrode. The characterization logic may also be configured to analyze signals produced in response to introducing the signals into a subject. The example system may also include a compensation logic configured to determine whether an electrode is performing in a desired manner and to selectively compensate for electrode performance.
摘要:
A user interface high-lighter function for scanner software that allows a user to automatically select a portion or several disjoint portions of text within a region of text in a preview scan of a document. When activated, the high-lighter function causes the normal mouse cursor to be replaced with a high-lighter icon having an active edge. Using the mouse, the active edge of the high-lighter icon is moved across a desired portion of text, and background pixels traversed are displayed in a different color. The traversed pixels are then used as input for an image processing routine. Text regions are generated from the traversed pixels. The beginning and ending of lines not high-lighted are cropped. A polygonal bounding box is then displayed around the selected text. An un-highlight mode can be activated to reduce the selected text. An optimized re-scan of the to selected text can now be performed.
摘要:
A user interface for scanner software that allows a variable resolution preview scan of a document to be presented to the user in a preview box within a scanner software window. The user clicks on a point within the preview scan, and the classification of the image immediately around the click point is determined. A selection marker is automatically drawn around the selected image, and all portions of the preview scan outside the selection marker are grayed out. Based on the classification, adjustments are made automatically, and windows having control tools for adjusting various aspects of the selected image are automatically enabled or disabled. Once the desired area is properly selected and any adjustments have been made, the user can drag and drop the selected image with a mouse onto the desktop, a folder, or an open application to launch an optimized final scan of the selected image.
摘要:
In a method (300) for applying differential policies on at least one digital document (120a-120n) having a plurality of atomic units (122a-122n) among a plurality of workflow participants (110a-110n), in which the atomic units are assigned with at least one of a plurality of the differential policies, the at least one digital document is tessellated (304) to identify the atomic units and the at least one of the differential policies assigned to the atomic units. In addition, the atomic units are aggregated (306) according to the at least one of the differential policies assigned to the atomic units and respective sets of keys are associated (308) to the aggregated atomic units, in which common sets of keys are associated with the aggregated atomic units assigned with the same policies.
摘要:
A reading device reads ambiguous target elements of an authentication target printed on a medium. Each ambiguous target element has a number of different manners by which the ambiguous target element can be interpreted by the reading device. The authentication target as read by the reading device is compared against an authentication signature of the reading device. The authentication signature specifies for each ambiguous target element an expected manner by which the reading device interprets the ambiguous target element as one of the different manners by which the ambiguous target element can be interpreted. Where the authentication target as read by the reading device matches the authentication signature of the reading device, the reading device is signaled as having passed authentication.
摘要:
An embodiment of a fingerprinting system may include a receiver configured to receive a finger and an image-capturing device optically coupled to the receiver and configured to capture an image of a fingerprint from a target region of the finger. The image-capturing device may include an afocal optical system. The fingerprinting system may configured so that the image-capturing device captures the image of the fingerprint from the target region without the target region of the finger being in direct physical contact with a solid surface.
摘要:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
摘要:
In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of the atomic unit reference name in the document serialization are replaced with the new name for the atomic unit to conceal the atomic unit reference name. In addition, a map file containing a map file entry for each of a plurality of workflow participants is generated, in which each of the map file entries includes the new name and an access key to access the atomic unit.