Abstract:
A method and system for multi-factor user authentication on an image processing device. The system includes a server used to authenticate a user, and to retrieve user information corresponding to user identification data. The user information is transmitted from the server to an image processing device, and processed by the image processing device. The processed image data can also be encrypted by using encryption information input to the image processing device.
Abstract:
A method is provided for determining whether an object is an authentic object to which an expected encoded image has been applied (S170). The expected encoded image having been constructed by encoding an authentication image using a set of one or more encoding parameters. The method comprises receiving a digital image of at least a portion of the test object including a target area where the expected encoded image would be applied if the test object is an authentic object (S120). The method further comprises determining the one or more encoding parameters (S130) and applying a digital decoding algorithm to the captured digital image to establish a decoding result (S150). The decoding result may then be compared to object authentication criteria to establish an authentication result (S160). In particular embodiments of the invention, the actions of receiving, determining, applying and comparing are carried out by an authentication server and the digital image is received from an inspection processor over a network.
Abstract:
A network comprises a printer, a plurality of workstations and a portable device. A user can execute or generate a print job on the workstation. The print job will be transferred to the printer through the network. The printer will not print the print job until the user brings the portable device into proximity of printer.
Abstract:
A method wherein a digital camera (12) is programmed to require a password to authorize its operation, and programs to respond to data instructing limited use. In order to operate the camera (12), a user must first call the owner's authorization facility (14) and send the specific camera identification number and the user's account or credit card number for billing purposes. With the camera (12) in communication with the owner's facility to a network connection (22, 23), the owner then sends data to the camera (12), including the password and specific conditions allowing the requested use. For example, the use may be for a set number of images for a still camera, or a set amount of recording time if the camera is a video camera, or for use during a certain set period of time. The user is then able to operate the camera (12) within the purchase limits and is billed accordingly by the owner.
Abstract:
A programmeable digital camera requiring a password from an external computer source to be accessed by an authorized user. The camera, in an embodiment, also requires access control to be conditional upon entry of the authorized user biometric data. The camera time useage is set to expire in a predetermined time period unless an authorized user reenters the password or correct biometric data.
Abstract:
A digital camera (10) method and apparatus providing encryption of an image during the acquisition process, and therefore avoiding any state wherein unencrypted image data exists. An encrypted password is generated (70, 80). This is done either by a user and downloaded to the camera, or it is generated in the camera and displayed to the user. Inside the camera, an encryption generator is initialized upon reception and successful decryption of the password (82), whereupon light is admitted from an object to be photographed and converted to digital image data (88). The camera then performs a first encrypting operation (95) on the digital image data to create temporarily encrypted image data. This encrypted data is saved temporarily (96), whereupon it is decrypted in increments (98) and each increment processed to form processed image data. Each increment then undergoes a second and final encryption operation to create final encrypted image data which is stored in the camera for transmission to a computer.
Abstract:
A global network computer system to print legal currency and/or negotiable instruments at a designated location by the input of information to the global network computer system from a remote location. The global network computer system can receive the input information from a telephone handset or terminal (14) using a technique of selective generation of signals. Output signals from the global network computer can be sent to designated facsimile machines (32), laser printers (32), telecopiers or automated teller machines (24) for printing the legal currency or negotiable instrument. The global network is also capable of storing and tracking greenback currency provided with a unique barcode.