Browse Prior Art Database

REMOTE STORAGE AND RETRIEVAL OF CONTROL SOFTWARE IN SCANNING SYSTEMS

IP.com Disclosure Number: IPCOM000026210D
Original Publication Date: 1990-Oct-31
Included in the Prior Art Database: 2004-Apr-05
Document File: 2 page(s) / 81K

Publishing Venue

Xerox Disclosure Journal

Abstract

In a digital scanner, remote storage and retrieval of scanner control software can be utilized to decrease the field upgrade costs, facilitate a phased development of control software, and reduce costs. The process is applicable to scanning systems which include a dedicated host/fler as part of the system as well as in desktop scanners which connect to a personal computer.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 65% of the total text.

Page 1 of 2

XEROX DISCLOSURE JOURNAL

REMOTE STORAGE AND RETRIEVAL OF CONTROL SOFTWARE IN SCANNING SYSTEMS

James R. Graves David E. Crocker James R. Reno

Proposed Classification
U.S. C1.358/444 Int. C1. H04n 1/40

In a digital scanner, remote storage and retrieval of scanner control software can be utilized to decrease the field upgrade costs, facilitate a phased development of control software, and reduce costs. The process is applicable to scanning systems which include a dedicated host/fler as part of the system as well as in desktop scanners which connect to a personal computer.

An Image Input Terminal (IIT) stores the scanner operating code for the Image Processing Module (IPM) and Raster Input Scanner (RIS) on the disk system of the host controller or Electronic Sub-system (ESS). The IIT file on the ESS
disk includes operating code, control set point storage, and storage of test and image process control arrays (data patterns). The IIT controls the retrieval of the control code during the power on initialization cycle. If during a reset sequence the IIT determines either the IPM or the R-s control code may be corrupted (via checksum validation), the operating code is again retrieved and installed to correct errors which have occurred.

After the control code has been retrieved and verified (via checksum), the IPM and FUS processors switch from a small boot control Read Only Memory (ROM) to the operating code and retrieves the control set points and default data structures...