摘要:
Disclosed is a method for detecting additional relevant resources in relation to a predefined initial number of resources, consisting of the following steps: a) a set of referencing resources consisting of all resources being linked to at least one of the initial resources is detected; b) a set of potential resources consisting of all resources referenced by the referencing resources is established; c) for each potential resource, a potential-resource relevance score is calculated between said potential resource and all initial resources on the basis of existing links in the referencing resources to the potential resource and the initial resources, and also on the basis of the relevance scores of referencing resources assigned to each referencing resource; d) for each referencing resource, a referencing-resource relevance score is recalculated on the basis of links occurring in said referencing resource to the potential resources and also on the basis of the potential-resource relevance score assigned to the potential resources in step c); e) step c), and if necessary several times step d) followed by step c), is repeated if necessary; f) said additional relevant resources are identified as the potential resources having the highest potential-resource relevance scores.
摘要:
A method for establishing connection weights between network nodes is implemented by communicating data processing units, a public key and a private key being associated with each node, a given node being able to communicate its public key to another node, thus forming a so-called real connection (“IRL-connected”) between two nodes, and each node also being able to communicate to another node a public key received from yet another node, thus forming a so-called indirect connection between the other node and the yet another node. Each node can have a specific connection weight in relation to another node with which it has a real or indirect connection. In order to determine the connection weight of a second node in relation to a first node, the method comprises calculating a set combination of weighting factors (influence, proximity) of third nodes that are IRL-connected to the second node.
摘要:
A method manages information resources in a computer system. The method includes receiving user information from an input device. The user information is representative of a declaration that a second resource accessible by the system should be associated with a first resource. The method further includes storing in association with the second resource an identifier of the first resource. The method identifies other resources that are relevant with respect to the second resource using a relevance scoring process. The method further determines whether the second resource with respect to other relevant resources has a first identifier associated herewith when one of the other resources is to be accessed by the system for display, and if it does, displays signaling information distinct from the display of the other resource itself signaling of the existence of the first resource.
摘要:
The invention relates to a method which is used in a computer environment in order to produce a current view from at least one source information object that can vary. The inventive method is characterised in that it comprises the following steps: a reference of the view in relation to the source information object is established and stored; a user implements at least one information object modification tool in order to produce a transformed information object from the source information object; a difference information set that is representative of the modification actions performed by the user with the tool(s) is recorded in a memory element; and a current view is produced from the current version of each source information object and said difference information set. The invention also relates to methods of allocating relevancy scores to the information objects, so that information objects can be accessed using such scores, for the management of references between information objects depending on whether or not modifications have been made to said information objects by the user, in order to: access selectively a derived information object created from a start information object; access information objects that are connected to others with directed links in a customised manner; access selectively one of a plurality of information objects from a start information object; display a customised information object obtained from a start information object; and, finally, manipulate information using a graphic user interface.
摘要:
A portable terminal includes a security envelope, the envelope being able to capture a signal transmitted by a generator of the terminal (screen, loudspeaker, etc.), to convey this signal and to restore it at the level of a sensor of the terminal (camera, microphone), so as to be able to detect a breach of this envelope by alteration of the restored signal.
摘要:
The invention relates to a secure entity, a trusted execution hardware environment (TEE) comprising a secure processing circuit and suitable for implementing a contract-execution architecture, such as a Wallet Node for executing a contract-type program, wherein said program can be loaded into an execution memory in response to a program identifier contained in a message that reaches the entity via a channel for communication with other entities, and a secure device for interaction with the physical environment of the entity, such as a sensor and/or actuator module, which can supply input data for the execution of the contract and/or receive data generated by the execution of the contract, the secure device containing its own secret key for securing exchanges within the framework of the execution of the program.
摘要:
Method for the secure execution of programs (smart contracts) implemented between a first wallet node (WN) (WN1) and a second wallet node (WN2), at least the second WN being implemented in an enclave of a processor, and the WNs being capable of executing programs designated in the messages that reach them, the method comprising the following steps: a) sending by WN1 to WN2 of a pre-message; b1) in response to this pre-message, execution in the enclave of a first program (WNRoT); b2) generation by the enclave of a certificate of authenticity of said first program and of the integrity of its execution; b3) sending said certificate to WN1; c) verification by WN1 of said certificate; d) in the event of successful verification, sending by WN1 to WN2 of a message intended to trigger the execution of a given program in WN2, and e) execution of said program in WN2.
摘要:
The invention relates to a method of managing commitments between entities forming the nodes of a network, each entity being housed in a computer processing unit, characterized in that it comprises the following steps: —establishing commitments (ENij) between commitment provider entities (Ei) and commitment beneficiary entities (Ej), one and the same entity being able to be both a commitment provider in relation to one or more other commitment beneficiary entities and a commitment beneficiary in relation to other commitment provider entities, —upon the default of an commitment on the part of a defaulting commitment provider entity, noted from a beneficiary entity benefiting from this same commitment, communicating to the provider entity from said beneficiary entity, and at least one other entity (upstream entity) whose defaulting provider entity is beneficiary, an indication of default of a commitment, and, —in response to this communication, altering at least one commitment whose defaulting provider entity is beneficiary. The invention is also aimed at various systems and methods capable, in a secure manner, of implementing programs or commitments which are executable at the level of a set of nodes of a network, for various applications.
摘要:
The invention relates to a method for the automatic combination of multi-dimensional data depending on manipulations at the level of their dimensions in a computer environment that comprises computer equipment capable of accessing multi-dimensional data sources. The method comprises the following steps: a) providing a first multi-dimensional data source; b) providing at least a second multi-dimensional data source, at least said second multi-dimensional data source being such that each data includes key values and non-key values in the different dimensions; c) identifying actions carried out using a user interface on representations of some dimensions of the sources; d) depending on said actions, combining the data sources by using the key values of each data of the second source(s) in order to establish associations between the multi-dimensional data of the first source and the multi-dimensional data of the second source(s) and to obtain combined multi-dimensional data, the combination being carried out as follows: i) adding to the multi-dimensional data of the first source at least a portion of the non-key values of the corresponding data of the second source(s); and ii) arranging the added non-key values with the pre-existing values for the same combined multi-dimensional data. The invention also relates to associated methods for the combination and enrichment of data and for the manipulation of the visualisation of resources.
摘要:
The invention concerns a method for accessing a resource in a computer environment, the resource comprising a set of objects. The invention is characterized in that the computer environment is adapted to store in association with at least one object of said resource at least one modified object, in that said computer environment comprises means for storing in association with such an object information concerning degree of elaboration, and in that it includes the following steps: identifying, for each object of the resource to which corresponds at least one modified object, based on data concerning degree of elaboration, at least one most elaborated version of said object; assembling the objects thus identified for display in the resource. The invention also concerns other methods for accessing to resources as well as resources structured therefor.