Abstract:
In an example embodiment, there is disclosed herein a picker that is operable to separate an individual sheet from a stack of sheets. The picker has a first rotatable picker member that includes a first high friction peripheral arcuate segment, where the first picker member is rotatable about an axis, a second rotatable member that includes a second high friction peripheral arcuate segment, wherein the second picker member is rotatable about the axis, and a drive in operative connection with the first and second rotatable picker members. The stack includes a bounding sheet having a sheet face bounding a side of the stack. The first and second arcuate segments are operable to concurrently engage the sheet face. The first and second picker members are operable to be separately rotationally movable about the axis responsive to operation of the drive.
Abstract:
In an example embodiment, a mounting structure for mounting a display monitor to a panel. The mounting allows the display monitor to be rotated so that it can be seen from either side of the panel.
Abstract:
A paper ejector unit which transports paper printed by a printing mechanism of a printer along a transport path includes a paper accumulator provided ahead of an end-of-transport path on a downstream side in a transport direction of the paper, the paper accumulator accumulating the paper ejected from the end, a door which opens and closes between a closed condition in which the paper accumulator is separated from an outside and an open condition in which the paper accumulator communicates with the outside, and a door opening and closing controller which maintains the door in the closed condition with no reception of input of an opening operation signal which opens the door, and changes the door from the closed condition to the open condition with reception of the input of the opening operation signal.
Abstract:
Embodiments of the invention are directed to a system, method, or computer program product for providing a position adaptive Automated Teller Machine (ATM) for customer privacy. In this way, the system senses, via a sensor, characteristics associated with the customer's portion relative to the ATM screen. The characteristics may include the stature of the customer, the relative proximity the customer is to the ATM, eye tracking or the like. Once the characteristics associated with the customer are determined the system may make adjustments via software and/or hardware to the ATM in order to present display information from the ATM in a private manner.
Abstract:
A method includes using a cryptographic infrastructure via a security processor in a device to communicate with a host, and managing, via the security processor, a cryptographic relationship with a security peripheral coupled to the security processor independent of the cryptographic infrastructure used to communicate with the host.
Abstract:
A first user establishes a communication session with a second user. During the communication session the first user communicates and receives communication from the second user in a first human language while the second user communicates and receives communication from the first user in a second communication language. The first and second human communication languages are different from one another. In an embodiment, at least one human communication language is sign language. In an embodiment, at least one human communication language is communicated via animation.
Abstract:
The present disclosure provides a display system which includes an electronic device and a user-side auxiliary viewing module. The electronic device may include a device-side display module, which includes an array substrate, a color filter substrate, a liquid crystal layer arranged between the array substrate and the color filter substrate, and a first polarizer adhered onto a surface of the array substrate away from the liquid crystal layer. A second polarizer may be arranged on the user-side auxiliary viewing module, and have a polarization axis in a direction substantially perpendicular to a polarization axis of the first polarizer.
Abstract:
Systems and methods to authenticate and verify user access replace the digits of a personal identification number (PIN) of a particular user with prompted randomized words that are to be uttered by an unidentified user. By virtue of this replacement, the PIN remains secret. A known speaker provides voice samples to the system in advance. The words uttered by the unidentified user (in response to the prompted words being displayed) correspond to digits. The uttered words are checked against the PIN, and are used to verify if the unidentified user's voice matches the voice of the known speaker.
Abstract:
An apparatus that operates to cause financial transfers responsive to data read from data bearing records, includes at least one processor that is in operative connection with a card reader, a check acceptor, a cash dispenser and a display. The at least one processor causes the machine to operate to read card data from a user card, and to cause a determination to be made that the read card data corresponds to an authorized financial account. The at least one processor is operative to cause data to be read from a check and/or cash to be dispensed, and a financial transfer to or from the account corresponding to the value thereof. Machine instructions are output and user transaction inputs can be received through either a primary or an auxiliary touch screen display.
Abstract:
In an exchange of data between a client terminal (1) and a secure database server (2) the data is encoded using positional information generated by a combination generator (7) in a separate security server (3). The positional information is used to produce an image specific to a communication event which is accessed by the client terminal (1) and is the basis for the entry of sensitive data at the client terminal (1). The three-way communication link between the client terminal, database server and security server greatly increases the difficulty of successfully intercepting and decoding the data entered at the client terminal. This method of secure data communication is particularly suited to the communication of password data for example in the banking industry.