Abstract:
Systems and methods for verifying physical proximity to a network device are provided. The method includes acquiring a tag identifier from a tag fixed in, on, or proximal to a network device, using a computing device. The tag is configured to be read and written to by electronic communication with the computing device, when the computing device is disposed in proximity to the tag. The method further includes transmitting data indicative of the tag identifier to a server, and receiving an authorization confirmation from the server. The method also includes rewriting the tag so as to replace the tag identifier with a new tag identifier, using the computing device, and performing one or more operations with the network device after receiving the authorization.
Abstract:
Methods and systems receive an electronic scanned image generated by activity of an application running on a portable computerized device, and calculate a cryptographic digest from data of the electronic scanned image using a second computerized device. Also, such methods and systems encrypt the cryptographic digest using an encryption key stored on the portable computerized device to create a content signature of the cryptographic digest, and send the content signature to the second computerized device. The authenticity of a copy of the electronic scanned image provided by the second computerized device is verified by recalculating the content signature (based on the copy of the electronic scanned image) using the encryption key from the portable device.
Abstract:
A method of printing a document from a mobile device coupling the mobile device to a print device. The method may also include launching a tap-to-print application software on the mobile device in response to the coupling, identifying a document to be printed via the tap-to-print application, and transmitting the document to be printed to the print device by the tap-to-print application. The tap-to-print application does not modify an operating system of the mobile device.
Abstract:
Methods and systems for merging and including an additional electronic document in a scan job. The scan job can be initiated and controlled by an application module running on a mobile communications device and the scan job can be stored in a buffer associated with a MFD scanner. A scan option to merge the scan job with the additional electronic document can be selected via the mobile communications device. The additional electronic document can be decomposed into pages by an interpreter and stored in the buffer. The scan job and the decomposed electronic document stored in the buffer can be delivered to a marshaling service running on a network. The additional electronic document can be added to the scan job based on an order of merging in order to generate a combined electronic document by an electronic document builder configured with the marshaling service.
Abstract:
The present invention generally relates to systems and methods for ensuring proximity between a first, e.g., mobile device, such as a smart phone, and a second, e.g., immobile device, such as a multi-function device. The invention can include the second device displaying a pattern that represents a series of movements, which a user of the first device can mimic. The first device can thus prove that it and its user are in proximity to the second device.
Abstract:
A method for establishing a network connection between a mobile electronic device and a target network device includes establishing a short-range communications link between the mobile electronic device and the target network device. The method may also include, by a processor, executing an application that causes the processor to receive network device information from the target network device, via the short-range communications link, use the identifier associated with the target network device to identify a network to which the target network device is connected, use a transmitter component of the mobile electronic device to establish the network connection between the mobile electronic device and the target network device, via the identified network, and cause the transmitter component to send a communication to the target network device, via the identified network. The network device information comprises an identifier associated with the target network device.
Abstract:
In implementations, a computer-implemented method for operating a multifunctional device (MFD) is disclosed. The computer-implemented method can include receiving a identification information from a tag that is associated with a MFD; identifying, by a processor, one or more operations based on the identification information that was received; and transmitting the one or more operations to the MFD.
Abstract:
Systems and methods for verifying physical proximity to a network device are provided. The method includes acquiring a tag identifier from a tag fixed in, on, or proximal to a network device, using a computing device. The tag is configured to be read and written to by electronic communication with the computing device, when the computing device is disposed in proximity to the tag. The method further includes transmitting data indicative of the tag identifier to a server, and receiving an authorization confirmation from the server. The method also includes rewriting the tag so as to replace the tag identifier with a new tag identifier, using the computing device, and performing one or more operations with the network device after receiving the authorization.
Abstract:
A first printer acquires a first network address from an external server using unicast (non-broadcast) transmissions. Then, second printers and an external computerized device also acquire the first network address from the external server, similarly using unicast transmissions. The second printers contact (e.g., say “hello” to) the first printer using a peer-to-peer network. The external computerized device contacts (again using unicast transmissions) the first printer using the first network address to cause the first printer to transmit a list of the second printers that have contacted the first printer to the external computerized device. The external computerized device then contacts (again using unicast transmissions) the second printers using the list of contacted printers (which includes network address information of the second printers) to allow the external computerized device to configure the second printers