Scanners are used to scan images on physical medium, such as paper, into electronic data files, which are transferred to computers for access, storage and display. When compared to having a scanning operator to manually grade student or survey response forms, using automatic scanning machines to scan preprinted forms saves time. Automatic scanning machines and preprinted forms enable rapid monitoring of items and personnel, and permit more frequent record keeping or testing than might otherwise be achieved if a human operator checked the forms manually. For example, such automatic scanning machines are used for tasks such as scoring scholastic test results, tallying attendance data and tallying inventory. The preprinted scannable forms may have markings to indicate responses from students in a format with rows and columns. The scannable forms may also include response control marks to indicate the positions of the response receiving rows, which can include numeric values or multiple choice letters.
A read head system for a scanner to scan images and optical marks from physical medium is disclosed.
In one general aspect, the techniques feature a scanner that includes a scanning head to scan data from a physical medium, an encryption algorithm for encrypting the scanned data, and a processor operable to use the encryption algorithm to encrypt the data scanned by the scanning head. The processor is operable to encrypt the scanned data substantially immediately (e.g., in real time) after at least some of the data scanned by the scanning head. The scanner also includes an output port to output the data encrypted by the processor.
Advantageous implementations can include one or more of the following features. The scanner can include multiple scanning heads including a top scanning head to scan a top side of the physical medium and a bottom scanning head to scan a bottom side of the physical medium. The scanner may include firmware configured to compress the scanned data to generate compressed data. The firmware can be operable to store multiple types of encryption algorithms. The scanner may also include a memory to store the data scanned by the scanning head, an input port to receive the encryption algorithm from a computer, and firmware configured to store the received encryption algorithm. The firmware can be embodied in a field programmable gate array (FGPA).
The encryption algorithm can be based on a Secure Sockets Layer (SSL) Internet security standard, an RSA public key encryption algorithm, or an ARCFOUR encryption algorithm. The scanner can be configured to encrypt the scanned data while scanning at least 60 pages per minute (ppm). The output port can be coupled to a wide area network, a local area network, a personal computer, the Internet, a Peripheral Component Interface (PCI), or a Universal Serial Bus (USB) connector.
In another aspect, a system includes a scanner to scan data from a physical medium, encrypt the scanned data, and output encrypted data. The system has a network coupled to the scanner, in which the network is operable to receive the encrypted data from the scanner and transfer the encrypted data. The system also includes a computer coupled to the network. The computer is operable to receive the encrypted data from the network and decrypt the data. The scanner is configured to encrypt the scanned data substantially immediately (e.g., in real time) after at least some of the physical medium is scanned.
Advantageous implementations can include one or more of the following features.
The scanner can be configured to read and optically recognize marks on the medium. The scanner can use an encryption algorithm stored on the scanner to encrypt the medium. The encryption algorithm can be a Secure Sockets Layer (SSL) Internet security standard, an RSA public key encryption algorithm, or an ARCFOUR encryption algorithm. The scanner may also be operable to compress the scanned data. The network can include a wide area network, a local area network, a wireless network, or the Internet.
The scanner can be configured to execute the encryption algorithm and scan the physical medium concurrently, in which the scanner can scan the physical medium at a rate of at least 60 pages per minute (ppm) while encrypting the scanned data. The system may also have a graphical user interface (GUI) to enable or disable the encryption.
In another aspect, a method involves scanning data from a document with a scanner, and using an encryption algorithm stored on the scanner to encrypt the scanned data in the scanner. The scanner is configured to encrypt the scanned data substantially immediately after at least some data from the document is scanned. The method also involves outputting the encrypted data from the scanner via an output port on the scanner.
Advantageous implementations can include one or more of the following features. The method may involve storing the scanned data in a memory in the scanner. In scanning the data, the scanner can recognize and read optical marks on the medium. The method may involve using a computer coupled to the scanner to select an option on the scanner to encrypt the scanned data.
In another aspect, a scanning system includes a scanning head configured to read documents including characters, marks, and images, and circuitry to switch between an image scanning mode and an optical mark recognition (OMR) mode. The scanning system includes a processor to process data scanned from the scanning head in either the image scanning mode or the optical mark recognition mode, and at least one output port for the processed data.
Advantageous implementations can include one or more of the following features. The circuitry can include firmware configured to switch between an image scanning mode and an optical mark recognition (OMR) mode. The scanning head can be configured to scan one side of each document. The scanning system can be configured to scan a double-sided document, in which the scanning system includes another scanning head to scan an opposite side of the double-sided document. The processor can be configured to process scanned data from both sides of the double-sided document. The circuitry can be configured to automatically recognize whether the scanned data are for the image scanning mode or the optical mark recognition mode. The scanning system can recognize scanned data for the optical mark recognition mode by recognizing scanned data for any one of a start-of-form mark, a response control mark, and an end-of-form mark on each scanned document.
The scanning system may include a graphical user interface (GUI) to facilitate switching between the image scanning mode and the optical mark recognition mode. The scanning system can have a first user-selectable option to scan in a manual mode or in an automatic mode. The automatic mode automatically can determine whether scanning is performed in the image scanning mode or the optical mark recognition mode. The manual mode can provide a second user-selectable option, in which the second user-selectable option is configured for manual switching between the image scanning mode and the optical mark recognition mode.
The scanning head can include a light-emitting diode lighting bar, a rod lens, and a circuit board with sensing devices. The scanning system may have a first-in-first-out (FIFO) memory to receive scanned data from the scanning head, a field programmable gate array (FPGA) with data compression functionality to compress scanned data from the FIFO, and a system bus configured to send scanned data from the FIFO to the FPGA. The system bus is further configured to send compressed data from the FPGA to the processor.
In another aspect, a scanning method involves scanning a document, and automatically determining a scanning mode for the document. The scanning mode includes an image scanning mode or an optical mark recognition mode. In automatically determining the scanning mode, the method involves using the optical mark recognition mode when recognizing data for a start-of-form mark on the document, and using the image scanning mode when not recognizing data for the start-of-form mark on the document.
Advantageous implementations can include one or more of the following features.
The scanning mode can include a firmware scanning mode for the document, in which the firmware scanning mode may include the image scanning mode or the optical mark recognition mode in firmware. The scanning method may also include providing an option for a manual scanning mode or an automatic firmware scanning mode. The automatic firmware scanning mode can include automatic triggering of the image scanning mode or the optical mark recognition mode. The manual scanning mode can include a manual selection option to manually select the image scanning mode or the optical mark recognition mode. The scanning of the document may involve scanning a double-sided document.
In another aspect, an apparatus for scanning a document includes a scanning head with contact image sensors. The scanning head is configured to read images and marks on the document. The apparatus includes a processor configured to process scanned images and marks. The processor is further configured to perform optical mark recognition (OMR) on the marks. The apparatus also includes a field programmable gate array (FPGA) with a compression algorithm to compress scanned data prior to sending the scanned data to the processor.
Advantageous implementations can include one or more of the following features.
The apparatus may also include a second scanning head to scan a side of the document opposite of a side for the first scanning head, in which the apparatus can be configured to scan single-sided documents and double-sided documents. The processor can be configured to process scanned data for single-sided and double-sided documents. The apparatus can be configured to automatically determine whether scanning is performed in an image scanning mode or an optical mark recognition mode.
The scanner may be coupled to a computer and/or a network, such as a local area network or the Internet, and may encrypt the scanned data. The disclosed scanning system may provide a number of advantages. For example, the scanning system may have hardware and software configured such that a single scanning head can both read images and perform optical mark recognition (OMR) from a form or document. Alternatively, the scanning system may have two scanning heads for double-sided forms or documents, in which each scanning head reads one side of the form. The scanning system scans double-sided forms with a single pass of the form across the scanning heads, in which both images can be scanned and OMR performed in a single pass.
In one advantage, the ability to both read images and perform OMR on one side of a form with a single scanning head reduces the amount of hardware and software resources required for the system. In some implementations, one or both sides of the form can be read with a scanning head used for each side of the form, and a single processor on a scanner board can process the scanned data.
In another advantage, the scanning system can scan one or more of the following: a numeric value block, a plurality of response control marks, response receiving rows, a bar code, markings in ink and/or pencil, images, optical character recognition (OCR) spaces and/or intelligence character recognition (ICR) spaces.
The scanner can scan a form and automatically determine if the scanned data corresponds to images or text or other marks for OMR. A user of a computer coupled to the scanner can use a graphical user interface (GUI) to select whether to activate or deactivate any of the following: manual scanning of images; manual scanning of OMR; or the user may select to allow the scanner to automatically determine whether it is scanning images or OMR markings.
In another implementation, a scanner includes a scanning head to scan data from a medium, a processor to execute a process to encrypt data scanned by from the scanning head, and an output port to output the data encrypted by the processor. For example, encrypting data at the scanner allows scanned electronic data files to be securely transmitted over public networks such as the Internet. The scanner with encryption may protect confidential data, such as hospital records, physician/patient records, tax returns, shipping receipts, invoices, and/or other company records before the data is sent to a user computer.
In another advantage, the scanner can scan data for one or more forms and encrypt the data in real time. In other words, the scanner can begin scanning a document and substantially immediately as the data from the scanned document is digitized, the scanned data can be encrypted by a processor in the scanner. A user of a computer coupled to the scanner can select whether to activate or deactivate the scanner encryption.
The details of one or more aspects are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.
Like reference symbols in the various drawings indicate like elements.
The following description is not to be taken in a limiting sense, but is made for the purpose of illustrating one or more uses of a scanner. For instance, a scanning system may have hardware and software so that a single scanning head can both scan images and perform optical mark recognition (OMR) from one side of a form or document. Alternatively, the scanning system may have two scanning heads for double-sided forms or documents, in which each scanning head reads one side of the form. The scanning system can scan double-sided forms with a single pass of the form across the scanning heads, in which both images and OMR can be scanned in the single pass.
The scanning system has the ability to read both images and OMR on one side of a form with a single scanning head that can reduce the amount of hardware and software resources required for the system. In some exemplary implementations, a single processor and a single scanning head can be used to read one side of a form for both OMR and images. In conventional systems, two or more scanning heads and two or more processors are required, in which a first scanning head and a first processor is used in scanning and processing images, and a second scanning head and a second processor is used in scanning and processing OMR.
In some implementations, the scanning system may encrypt data scanned by the scanning head and store the encrypted data and/or send the encrypted data out of an output port of the scanner. The scanner may include processing capabilities to encrypt the scanned data in real time.
If a test is being scored, for example, detection of a response control mark 14′ enables appropriate circuitry to compare a response entered in a response receiving space 15′ aligned with that response control mark 14′ with corresponding correct answer data stored in a memory. In other applications, responses entered in response spaces 15′ are tallied. The end-of-form mark 16′, the last mark in the control mark column 44′, enables score or tally printout, or triggers data storage or transmission. Both the start-of-form mark 12′ and the end-to-form mark 16′ can act as response control marks. The present disclosure is not limited to use with forms having a start-of-form mark 12′ and/or an end-of-form mark 16′.
The scanner 102 can scan text and images on a physical medium such as paper into an electronic data file, which may be sent to the computer 104A or the network 106. The computers 104A-104N may store, access and display the electronic data file from the scanner 102. The computers 104A-104N may have software to provide optical mark recognition (OMR) and/or optical character recognition (OCR) from the electronic data files. The computer 104A may transmit scanned electronic data files through the network 106 to other computers 104B-104N.
The scanned electronic data files may contain confidential information, such as hospital records, physician/patient records, tax returns, shipping receipts, invoices, company records, etc. The computer 104A may use encryption software to encrypt the electronic data files before sending them to other computers 104B-104N via the network 106. Alternatively, the scanner 102 may directly transmit an electronic data file to the computers 104B-104N via the network 106. The network 106 may be non-secure and open to public access. Other computers coupled to the network 106 may be able to intercept or access electronic data files from the scanner 102 or computers 104A-104N without user authorization. Potentially, spyware, viruses or other unauthorized software on the computer 104A itself may access or copy electronic files from the computer 104A without authorization before the computer 104A has a chance to encrypt the data files.
In some implementations, one or more of the computers coupled to the scanner may control the encryption functionality of the scanner. For example, one or more of the computers may have software for a graphical user interface (GUI) user to select an option to activate or deactivate encryption functionality on the scanner. In these exemplary implementations, a GUI user on a computer coupled to the scanner can select the option to determine whether the computer receives encrypted scanned data or unencrypted scanned data from the scanner.
In operation, the top and bottom scanning heads 501A-501B in
The microprocessor 401 executes the encryption application 204 of
The encryption application 204 may be based on the Secure Sockets Layer (SSL) Internet security standard and an encryption algorithm, such as the RSA public key encryption algorithm or ARCFOUR. Both the SSL standard and the RSA encryption algorithm were developed by RSA Data Security, Inc. ARCFOUR is a stream encryption algorithm used in network security systems. ARCFOUR was designed by Ron Rivest of RSA Data Security, and is known as “Rivest Cipher 4” or “Ron's Code.” Advantages of using ARCFOUR include an adjustable key size and a low amount of processing resources required to perform the encryption. In some implementations, ARCFOUR can be used in the scanner to allow at least 60 pages per minute (ppm) of scanning. Implementing the scanner with ARCFOUR can allow 128-bit protection against hacking, and can allow execution of the encryption algorithm in real-time with the scanning process. Alternatively, the processor 401 may use other types of encryption.
In some configurations, the encryption may be configured to a specific software application on the computer 208, which processes the image or OMR data for storage, display, transfer, etc. In other words, the encryption is application-specific and not user-specific, e.g., the encryption does not depend on a specific user or the user's name and password. In one configuration, the encryption and decryption processes do not use a password.
In some configurations, a user at the scanner 202 or computer 208 may select a type of encryption from a number of different encryption types stored at the scanner 202 or computer 208. Alternatively, the scanner 202 or computer 208 may provide an interface for a user to load an encryption application from another computer or go and find an encryption application via the Internet.
In one configuration, a user at the scanner 202 or computer 208 may enable and disable the encryption. In another configuration, the type of encryption used is not visible to a user of the scanner 202. The encryption algorithm may be implemented in the firmware of the scanning system. For example, the encryption algorithm may be implemented in software that is embedded in the hardware of the scanning system. The firmware can allow reading and executing of the encryption algorithm, but not modification of the encryption algorithm. The encryption algorithm may be located in a digital hardware device and/or memory, such as the FGPA 510 and/or the system memory 508. In some implementations, the encryption features of the scanner may be selected by one or more users using a graphical user interface (GUI) displayed on computers coupled with the scanner.
The firmware may automatically recognize if scanned documents are to be treated as OMR marks or as images. For example, the scanning system can recognize the start-of-form mark 12′, multiple response control marks 14′, and an end-of-form mark 16′ of the scan form (
The microprocessor 401 sends encrypted data to the computer 208 via a data channel, such as a Universal Serial Bus (USB) 2.0 at 480 Mbps, USB 1.1 at 12 Mbps, Small Computer System Interface (SCSI) Ultra 160 at 160 Mbps, SCSI Ultra 320 at 320 Mbps, 1394 FireWire at 400 Mbps, an Ethernet at 10 Mbps, a Fast Ethernet at 100 Mbps or an Asynchronous Transfer Mode (ATM) connection at 155 Mbps.
A number of aspects have been described. Nevertheless, it will be understood that various modifications may be made. Accordingly, other aspects are within the scope of the following claims.
This application claims the benefit of priority from U.S. Provisional Application entitled “IMAGE AND OPTICAL MARK SCANNER WITH ENCRYPTION,” filed Apr. 16, 2004 by Dave Coleman and Joe Zajac, application Ser. No. 60/562,725, the disclosure of which is incorporated by reference. This application is cross-related to U.S. application entitled “SCANNER READ HEAD FOR IMAGES AND OPTICAL MARK RECOGNITION,” filed on Apr. 15, 2005 by Dave Coleman and Joe Zajac.
Number | Date | Country | |
---|---|---|---|
60562725 | Apr 2004 | US |