Application of differential policies to at least one digital document

    公开(公告)号:US09633215B2

    公开(公告)日:2017-04-25

    申请号:US13810718

    申请日:2010-09-21

    IPC分类号: H04L29/00 G06F21/62 G06F17/30

    CPC分类号: G06F21/6209 G06F17/30011

    摘要: In a method (300) for applying differential policies on at least one digital document (120a-120n) having a plurality of atomic units (122a-122n) among a plurality of workflow participants (110a-110n), in which the atomic units are assigned with at least one of a plurality of the differential policies, the at least one digital document is tessellated (304) to identify the atomic units and the at least one of the differential policies assigned to the atomic units. In addition, the atomic units are aggregated (306) according to the at least one of the differential policies assigned to the atomic units and respective sets of keys are associated (308) to the aggregated atomic units, in which common sets of keys are associated with the aggregated atomic units assigned with the same policies.

    Authentication target having ambiguous target elements
    102.
    发明授权
    Authentication target having ambiguous target elements 有权
    认证目标具有不明确的目标元素

    公开(公告)号:US09305157B2

    公开(公告)日:2016-04-05

    申请号:US11467539

    申请日:2006-08-25

    IPC分类号: H04L9/00 G06F21/36

    CPC分类号: G06F21/36

    摘要: A reading device reads ambiguous target elements of an authentication target printed on a medium. Each ambiguous target element has a number of different manners by which the ambiguous target element can be interpreted by the reading device. The authentication target as read by the reading device is compared against an authentication signature of the reading device. The authentication signature specifies for each ambiguous target element an expected manner by which the reading device interprets the ambiguous target element as one of the different manners by which the ambiguous target element can be interpreted. Where the authentication target as read by the reading device matches the authentication signature of the reading device, the reading device is signaled as having passed authentication.

    摘要翻译: 读取装置读取打印在介质上的认证对象的不明确的目标元素。 每个模糊的目标元素具有多种不同的方式,通过该方式,可以通过读取装置解释模糊的目标元素。 由读取装置读取的认证对象与读取装置的认证签名进行比较。 认证签名为每个模糊目标元素指定预期的方式,通过该方式,读取设备将不明确的目标元素解释为可以解释模糊目标元素的不同方式之一。 在由读取装置读取的认证对象与读取装置的认证签名相匹配的情况下,将读取装置发信号通过认证。

    System for generating an incrementally completed security mark
    103.
    发明授权
    System for generating an incrementally completed security mark 有权
    用于生成递增完成的安全标记的系统

    公开(公告)号:US08973843B2

    公开(公告)日:2015-03-10

    申请号:US13810722

    申请日:2010-10-12

    IPC分类号: G06K19/06 H04N1/32 G06T1/00

    摘要: A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.

    摘要翻译: 用于生成递增完成的安全标记(20'“)的系统(10)包括用计算机程序编码的计算机可读介质。 计算机程序包括用于选择载体对象(20,20',20“,20”“)的计算机可读代码; 用于选择与所述载体对象(20,20',20“,20”“)相关联的工作流中的多个步骤的计算机可读代码以及所述工作流程中的每个步骤的安全级别; 计算机可读代码,用于确定在工作流程中的每个步骤写入信息的可用载体对象候选区域(T1,T2,T3,T4,T5); 以及用于基于相应的安全级别和可用候选区域(T1,T2,T3,T4,T5)确定要在工作流程中的每个步骤输入的比特数的计算机可读代码。 该系统还包括存储器和可操作地耦合到存储器和计算机可读介质的处理器。

    Managing information in a document serialization
    104.
    发明授权
    Managing information in a document serialization 有权
    管理文档序列化中的信息

    公开(公告)号:US08972747B2

    公开(公告)日:2015-03-03

    申请号:US13014062

    申请日:2011-01-26

    CPC分类号: G06F21/6209

    摘要: In a method for managing information comprising a reference name of an atomic unit listed in a document serialization, a new name for the atomic unit reference name is generated and occurrences of the atomic unit reference name in the document serialization are replaced with the new name for the atomic unit to conceal the atomic unit reference name. In addition, a map file containing a map file entry for each of a plurality of workflow participants is generated, in which each of the map file entries includes the new name and an access key to access the atomic unit.

    摘要翻译: 在用于管理信息的方法中,包括文档序列化中列出的原子单元的引用名称,生成原子单元引用名称的新名称,并且文档序列化中原子单元引用名称的出现被替换为新名称 原子单位隐藏原子单位参考名称。 此外,生成包含用于多个工作流参与者中的每一个的地图文件条目的地图文件,其中每个地图文件条目包括新的名称和访问原子单元的访问密钥。

    System and method for document policy enforcement
    106.
    发明授权
    System and method for document policy enforcement 有权
    用于文件策略执行的系统和方法

    公开(公告)号:US08943603B2

    公开(公告)日:2015-01-27

    申请号:US13700804

    申请日:2010-07-08

    IPC分类号: G06F21/00 G06F21/60 G06Q10/10

    CPC分类号: G06F21/60 G06Q10/10

    摘要: A system and method is disclosed for document policy enforcement. The method discloses: scanning document parts for a set of policy-eliciting terms; assigning a policy to a document part based on a policy-eliciting term found within the document part; and enforcing the policy. The system discloses a computer programmed with executable instructions which operate a set of modules, wherein the modules comprise: a policy editor and a policy daemon, for effecting the method.

    摘要翻译: 公开了用于文档策略实施的系统和方法。 该方法公开:扫描文档部分以获取一组策略引用术语; 基于在文档部分中找到的策略引用术语将策略分配给文档部分; 并执行该政策。 该系统公开了一种用可操作的指令编程的计算机,其操作一组模块,其中模块包括:策略编辑器和策略守护程序,用于实现该方法。

    Generation of an individual glyph, and system and method for inspecting individual glyphs
    107.
    发明授权
    Generation of an individual glyph, and system and method for inspecting individual glyphs 有权
    单个字形的生成,以及用于检查单个字形的系统和方法

    公开(公告)号:US08818047B2

    公开(公告)日:2014-08-26

    申请号:US13259139

    申请日:2009-05-21

    摘要: A method for generating individual glyphs, and a system and method for inspecting individual glyphs are disclosed. The system includes a true resolution imaging device configured to capture an image of a printed glyph. A registry service has a database for storing other glyphs and/or parameters of other glyphs. An analysis system, in selective communication with the registry service, includes computer software configured to receive the captured image; an image analysis program configured to perform forensic analysis on the received image to determine parameter(s) associated with the glyph; and an image comparison program configured to i) compare the glyph parameter(s) with parameters stored in the registry for other glyphs or with parameters determined, by image analysis program, for the other glyphs stored in the registry, and ii) generate a probability that the glyph and object are authentic based upon the comparison.

    摘要翻译: 公开了一种用于生成单个字形的方法,以及用于检查各个字形的系统和方法。 该系统包括被配置为捕获打印字形的图像的真实分辨率成像装置。 注册服务具有用于存储其他字形和/或其他字形参数的数据库。 与注册服务选择性地通信的分析系统包括被配置为接收所捕获的图像的计算机软件; 图像分析程序,被配置为对所接收的图像执行取证分析以确定与所述字形相关联的参数; 以及图像比较程序,其被配置为i)将所述字形参数与存储在所述注册表中的其他字形的参数或通过图像分析程序为存储在所述注册表中的其他字形确定的参数进行比较,以及ii)生成概率 基于比较,字形和对象是真实的。

    Managing sequential access to secure content using an encrypted wrap
    108.
    发明授权
    Managing sequential access to secure content using an encrypted wrap 有权
    使用加密的包装管理对安全内容的顺序访问

    公开(公告)号:US08793503B2

    公开(公告)日:2014-07-29

    申请号:US13106354

    申请日:2011-05-12

    IPC分类号: G06F21/00

    CPC分类号: H04L9/3247 H04L2209/60

    摘要: In a method for managing sequential access to secure content by a plurality of workflow participants, a key-map file for each of the participants is created. Each of the key-map files contains a subset of encryption and signature keys for the content. The key-map files are sorted in an order that is the reverse of a workflow order in which the workflow participants for which the key-map files were created are to access the secure content. An encrypted later wrap including a later key-map file for a later workflow participant along the workflow order and an encrypted first wrap including a prior key-map file for a prior workflow participant and the encrypted later wrap are created. In addition, the first wrap is incorporated into a document serialization for the content.

    摘要翻译: 在用于管理多个工作流参与者对安全内容的顺序访问的方法中,创建每个参与者的密钥映射文件。 每个密钥映射文件包含内容的加密和签名密钥的子集。 密钥映射文件按照与创建密钥映射文件的工作流参与者访问安全内容的工作流顺序相反的顺序进行排序。 创建加密的后续包装,其包括用于随后的工作流程参与者的随后的密钥映射文件,以及包括用于先前工作流参与者的先前密钥映射文件和加密的后续包装的加密的第一包装。 此外,第一个包装被并入到内容的文档序列化中。

    Text Summarization
    109.
    发明申请
    Text Summarization 审中-公开
    文本总结

    公开(公告)号:US20140195897A1

    公开(公告)日:2014-07-10

    申请号:US14235876

    申请日:2011-09-20

    IPC分类号: G06F17/21

    CPC分类号: G06F17/212 G06F16/345

    摘要: Methods, systems, and computer readable media with executable instructions, and/or logic are provided for text summarization. An example method of text summarization can include determining, via a computing system (674), a graph (314) with a small world structure, corresponding to a document (300) comprising text, wherein nodes (316) of the graph (314) correspond to text features (302, 304) of the document (300) and edges (318) between particular nodes (316) represent relationships between the text features (302, 304) represented by the particular nodes (316) (440). The nodes (316) (442) are ranked via the computing system (674), and those nodes (316) having importance in the small world structure (444) are identified via the computing system. Text features (302, 304) corresponding to the indentified nodes (316) are selected, via the computing system (674), as a summary (334) of the document (300) (446).

    摘要翻译: 提供了具有可执行指令和/或逻辑的方法,系统和计算机可读介质用于文本概括。 文本摘要的示例性方法可以包括通过计算系统(674)确定与包括文本的文档(300)相对应的具有小世界结构的图形(314),其中图形(314)的节点(316) 对应于文档(300)的文本特征(302,304),并且特定节点(316)之间的边缘(318)表示由特定节点(316)(440)表示的文本特征(302,304)之间的关系。 通过计算系统(674)对节点(316)(442)进行排名,并且通过计算系统识别在小世界结构(444)中具有重要性的那些节点(316)。 作为文件(300)(446)的总结(334),经由计算系统(674)选择与识别节点(316)对应的文本特征(302,304)。

    System for recovering data from an unreadable tag
    110.
    发明授权
    System for recovering data from an unreadable tag 有权
    从不可读标签恢复数据的系统

    公开(公告)号:US08760263B2

    公开(公告)日:2014-06-24

    申请号:US13259135

    申请日:2009-03-31

    IPC分类号: G06K7/01

    摘要: A system includes a population of items each including a tag, each tag including a plurality of identification bits and a plurality of redundancy bits, and a tag reader configured to read tags and determine the identification bits of at least one unreadable tag in the population based on the identification bits and the redundancy bits of at least one readable tag in the population.

    摘要翻译: 一种系统包括一组项目,每个项目包括标签,每个标签包括多个识别位和多个冗余位;以及标签读取器,被配置为读取标签并确定基于群体的至少一个不可读标签的标识位 关于群体中的至少一个可读标签的识别位和冗余位。