Abstract:
Embodiments of the invention include a toner cartridge for the printing of MICR characters that includes a memory device that is programmed with the requisite font for MICR characters. The font is accessible for the printing of MICR characters when the toner cartridge is installed in a printer. In a further embodiment, the memory device on the toner cartridge may also contain a data flag indicating that a print job must print at least one symbol in the MICR font. Corresponding printer firmware may then determine if this flag is present, and, if present, will prevent the printing of print jobs that do not include at least one character to be printed in the MICR font. This prevents MICR toner from being wasted on documents that do not require MICR toner, such as normal office correspondence.
Abstract:
Example systems, methods, computer-readable mediums, and other forms of a secure foreign enterprise printing system are provided. An example system may include a wireless telephonic logic for communicating with a wireless network web services provider and a wireless network communication logic configured to communicate a print request to the wireless network web services provider using the wireless telephonic logic. The print item may be stored in a first enterprise and may be printed on an image forming device that is located in a second enterprise. The example system may also include an encryption logic configured to facilitate providing security for the print item as it travels from the first enterprise to the image forming device.
Abstract:
A print job is received (e.g., by a print server) that has an associated print destination. A determination is made as to a first location associated with a source of the print job. Another determination is made regarding a second location associated with the print destination. A printing policy associated with the print job is identified. The print job is communicated to the print destination if the print job satisfies the printing policy. The printing policy may determine whether the first location is the same as the second location. Also, the printing policy may determine whether the first and second locations are located in a common facility (such as a hotel) and whether the second location is in a controlled area of the common facility (such as the front desk).
Abstract:
Methods and systems for enhancing the input fidelity of personal digital assistants (PDAs), and other handheld stylus-engagable computing devices are described. In some embodiments, this can be done by associating input commands with different user-input activities, including different combinations of user-input activities. By using different combinations of user-input activities to designate particular input commands, a more robust collection of commands can be provided to a user in a manner that is simple, straight-forward and easy to understand.
Abstract:
A system and method for proper authorization of printing services is described. The system and method allows networks to control which users have access to printing services and the type of services they may utilize. In one exemplary implementation, the system supports a communications link, an agent, and a server. The agent provides an interface connection between a user and the communications link. The agent also assigns an authorization code to a header of a print job sent by the user. A monitoring device for the communications link receives the print job and verifies whether the authorization code is valid, prior to permitting the print job to be sent to a printer.
Abstract:
Various systems and methods are provided for monitoring and supporting a number of peripheral devices. In one embodiment, a network is provided that comprises a local agent in a local server that is in data communication with the number of peripheral devices. An amount of status information is obtained from the peripheral devices and stored in the local server. The network also includes a central monitoring system in a central monitoring server that is in data communication with the local agent. A copy of the status information is transmitted from the local agent to the central monitoring system and stored in the central monitoring server. Also, a status board is maintained by the central monitoring system, the status board indicating at least one service event associated with an operation of at least one of the peripheral devices.
Abstract:
In one embodiment, an image forming device is provided that includes a replaceable component. The image forming device includes an operating state configured to form images utilizing the component. The image forming device further includes a security state configured to reduce access to the replaceable component in response to a triggering event.
Abstract:
An imaging system includes an authorization logic that authenticates a imaging request. The system determines whether the imaging request includes a code that matches an access code that is displayed by an imaging device in the system. If there is a match, the imaging request is processed.
Abstract:
An imaging device such as, for example, a printer, scanner, or copier is provided that includes a processor circuit having a processor and a memory and a number of physical components that perform at least one imaging function, the physical components being controllably coupled to the processor circuit. The memory includes an allocated portion of memory to accommodate the storage of a control system to be installed therein. A control system installer is stored in the memory and is executable by the processor. The control system installer includes logic that downloads the control system from a remote device via a network, and, logic that installs the control system in the allocated portion of the memory.
Abstract:
Systems, methods and devices for associating meta-data to a received job are provided. One method includes detecting the job request at an agent on a source device. The method further includes identifying the source device and a type of the job request. Meta-data is associated with the job request at the agent on the source device based on an identity of the source device and the type of the job request.