Abstract:
A system of identifying one or more fillable fields of an electronic form may include an electronic device, and a computer-readable storage medium that includes one or more programming instructions. The programming instructions are configured to instruct the electronic device to receive an electronic form, identify fillable field candidates of the electronic form, and determine, for each fillable field candidate, whether the fillable field candidate is a fillable field. The system updates metadata associated with the electronic form by applying a sequencing framework to only the fillable fields by obtaining position information for each fillable field that indicates a position of the fillable field on the document, sorting the fillable fields based on the position information to form a sequence of fillable fields, determining a designator to each fillable field that indicates a position of a corresponding fillable field in the sequence, and storing the designator.
Abstract:
A document validation system receives a scan of a certified document. The system identifies a security template for the document, prompts a user to enter a validation document into the scanning device, receives the validation document, uses the security template identify the location of one or more security elements on the certified document, and analyzes the validation document to identify expected content that should appear on the certified document at the security element locations. The system determines whether the expected content matches actual content of the scan at the security element locations and generates a report of the result.
Abstract:
A system generates a secure barcode by: identifying a primary pattern for a two-dimensional barcode to be printed on a substrate, wherein the primary pattern comprises of a set of dark cells and a set of light cells; identifying a two-dimensional micro-shape, wherein the micro-shape has a size that is no larger than a size of each cell of the two-dimensional barcode; generating a secondary pattern comprising a plurality of the micro-shapes; and superimposing the secondary pattern with the primary pattern for the two-dimensional barcode to yield a secure barcode. The resulting two-dimensional barcode includes a primary pattern comprising a set of dark cells and a set of light cells, where the sets represent encoded data, along with a secondary pattern of micro-shapes that are superimposed with the primary pattern.
Abstract:
A document validation system receives a scan image of a document to be certified, analyzes the scan image to identify one or more characteristics of the scan image, and uses the identified characteristics to identify a security template. In response to a validation request, the system uses the identified security template to create a validation document that includes descriptive material comprising the location of one or more security elements on the document to be certified.
Abstract:
Some embodiments are directed to systems and methods for processing a check that is issued to an account holder by a bank. The method includes scanning, by a client device, at least one pre-defined machine-readable cypher that is present on the check, the check further defines at least one pattern; sending, by the client device, a service request including the scanned pre-defined machine-readable cypher to a server device; receiving, at the client device, a code that is tailored to the check based on an authentication of the service request from the server device, the code is machine-readable and includes at alphabet(s), a numeral(s), and/or a symbol(s); and changing the appearance, by the account holder, of the pattern on the check based on the received code.
Abstract:
A system and method for verifying proximity to a computational tag by receiving a first token from a server and transmitting the first token to the computational tag. The computational tag can verify the first token and generate a second token based on the first token where the second token includes a signature of the computational tag. The computational tag can transmit the second token to the mobile device and the mobile device can transmit the second token to the server. The server can verify the second token and allow access to a messaging service based on the verification of the second token.
Abstract:
Embodiments of the disclosure disclose methods, and systems for capturing, sharing and printing annotations. The method includes receiving a physical document including hand-written annotation, the hand-written annotation is made by a user corresponding to at least a portion of the physical document. The method further includes capturing the hand-written annotation and corresponding position information of the hand-written annotation, wherein capturing further includes capturing position information of the at least portion of the physical document. Further, the method includes storing the captured hand-written annotation, position information of the hand-written annotation and position information of the at least portion of the physical document. Moreover, the method includes associating the hand-written annotation to the at least portion of the physical document. Additionally, the method includes sharing the hand-written annotation with other users.
Abstract:
A mobile electronic device is used to decode a printed correlation mark. The device receives an image of a printed correlation mark, identifies a decoding template, applies the template to detect hidden content within the printed correlation mark, and outputs an image of the detected hidden content on the display. The device may enhance the image before presenting it on the display.
Abstract:
To print a certified document, a user may select or a system may receive a selection of a document to be certified. The system identifies a security template to be used based on the document and/or capabilities of the print device on which the document will be printed. The system may display the document with a non-secure overlay of the selected security template, add a unique security element to the document according to the template, and cause the document to be printed at the selected print device with the added security element without permitting the added security element to be fully displayed or printed on any other device.
Abstract:
Methods and apparatus are presented for visual comparison of different portions of one or more source documents to emulate a paper folding gesture experience in a user device, in which the user uses a mouse or finger in a touchscreen device to circle two or more portions of interest in the same or separate source documents, and provides a different user input such as a pinch motion or zoom in feature to display the selected regions proximate one another for visual comparison.