摘要:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
摘要:
In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of the atomic unit reference name in the document serialization are replaced with the new name for the atomic unit to conceal the atomic unit reference name. In addition, a map file containing a map file entry for each of a plurality of workflow participants is generated, in which each of the map file entries includes the new name and an access key to access the atomic unit.
摘要:
A system and method is disclosed for document policy enforcement. The method discloses: scanning document parts for a set of policy-eliciting terms; assigning a policy to a document part based on a policy-eliciting term found within the document part; and enforcing the policy. The system discloses a computer programmed with executable instructions which operate a set of modules, wherein the modules comprise: a policy editor and a policy daemon, for effecting the method.
摘要:
A method for generating individual glyphs, and a system and method for inspecting individual glyphs are disclosed. The system includes a true resolution imaging device configured to capture an image of a printed glyph. A registry service has a database for storing other glyphs and/or parameters of other glyphs. An analysis system, in selective communication with the registry service, includes computer software configured to receive the captured image; an image analysis program configured to perform forensic analysis on the received image to determine parameter(s) associated with the glyph; and an image comparison program configured to i) compare the glyph parameter(s) with parameters stored in the registry for other glyphs or with parameters determined, by image analysis program, for the other glyphs stored in the registry, and ii) generate a probability that the glyph and object are authentic based upon the comparison.
摘要:
In a method for managing sequential access to secure content by a plurality of workflow participants, a key-map file for each of the participants is created. Each of the key-map files contains a subset of encryption and signature keys for the content. The key-map files are sorted in an order that is the reverse of a workflow order in which the workflow participants for which the key-map files were created are to access the secure content. An encrypted later wrap including a later key-map file for a later workflow participant along the workflow order and an encrypted first wrap including a prior key-map file for a prior workflow participant and the encrypted later wrap are created. In addition, the first wrap is incorporated into a document serialization for the content.
摘要:
Methods, systems, and computer readable media with executable instructions, and/or logic are provided for text summarization. An example method of text summarization can include determining, via a computing system (674), a graph (314) with a small world structure, corresponding to a document (300) comprising text, wherein nodes (316) of the graph (314) correspond to text features (302, 304) of the document (300) and edges (318) between particular nodes (316) represent relationships between the text features (302, 304) represented by the particular nodes (316) (440). The nodes (316) (442) are ranked via the computing system (674), and those nodes (316) having importance in the small world structure (444) are identified via the computing system. Text features (302, 304) corresponding to the indentified nodes (316) are selected, via the computing system (674), as a summary (334) of the document (300) (446).
摘要:
An image analyzer (120) aggregates image samples (140) into a cluster (170) based on the image samples (140) being classified from a subset of image metrics applied to a reference sample (130). The image analyzer (120) generates an image quality output (150) by analyzing a distance (180) from the cluster (180) relative to another cluster.
摘要:
A system includes a population of items each including a tag, each tag including a plurality of identification bits and a plurality of redundancy bits, and a tag reader configured to read tags and determine the identification bits of at least one unreadable tag in the population based on the identification bits and the redundancy bits of at least one readable tag in the population.
摘要:
A method includes obtaining input to modify a policy of a set of context-aware document policies. A policy of the set is applicable to a requested action on a document so as to indicate allowability of the requested action based at least on satisfaction of a condition of the policy that relates to a content of the document. When a plurality of policies of the set are applicable to the requested action on the document, allowability of the requested action is determined by the allowability that is indicated by application of the applicable policy with a highest priority. The modified policy is compared with another policy of the set. If the comparison indicates the modified policy and the other policy are applicable to a single requested action on a single document, the set of policies is automatically ensured to remain self consistent.