摘要:
A method and an apparatus for handling updated or new entries for a document log are described. In one embodiment, the method comprises receiving a user input of a document identifier for a document and displaying information from metadata entries associated with the identifier.
摘要:
In a system for inputting and managing document collections, the order in which documents are presented to the system dictates the organization and hierarchy for the electronically stored document collection. Users can add annotations to documents and collections by writing on a coversheet; the system scans the coversheet, reads the written material, and adds the material to the electronically stored document and/or collection. In addition, in one aspect the invention provides a mechanism for granting different levels of access to different individuals, by generating coversheets that point to the same collection but that provide different levels of access to the collection.
摘要:
A distributed peer-to-peer document archive system provides version-control, security, access control, linking among stored documents and remote access to documents usually associated with centralized storage systems while still providing the simplicity, personalization and robustness to network outages associated with personal and peer-to-peer storage systems. A “keyring” is an encrypted repository that allows a user to recover and access a user's entire digital archive with a single master key. After the key is created, it does not need to be updated, and can be stored in a safe, safety-deposit box or other secure location. In the event the user's computer is stolen or destroyed, the user need only install the system on a new machine and import the master key. The system will then use that key to browse nearby servers to find and decrypt all files necessary to recreate the full digital archive in its most recent state.
摘要:
A method and apparatus for logging based identification are described. In one embodiment, the method comprises extracting entries of a hash chained log that represents a series of previous transactions. The method may also comprise ordering hash values of the entries extracted from the hash chained log into an ordered list. In one embodiment, the method may further comprise producing a cryptographic hash of the ordered list.
摘要:
A Mixed Media Reality (MMR) system and associated techniques provide mechanisms for forming a mixed media document that includes media of at least two types (e.g., printed paper as a first medium and digital content and/or web link as a second medium). The MMR system includes an action processor and methods, and an MMR document with having an associated action. The MMR document specifies different actions for different MMR documents, and creates any number of MMR documents for a particular location on any media, thereby allowing the MMR architecture to serve as a universal trigger or initiator for additional processing. The action processor receives the output of the MMR recognition process which yields an MMR document including at least one action. The action processor executes that action which includes various commands to the MMR system or other systems coupled to the MMR system. The MMR system architecture can perform action such as retrieving the electronic form of the document to the capture device, retrieving the specification for the action, inserting data to a MMR document, transferring data between documents, purchasing items, authoring actions or reviewing historical information about actions.
摘要:
Secure stamping of multimedia document collections is disclosed. In one embodiment, the method comprises adding an image to a collection of media objects, and producing a visual representation of the collection that includes the image, where the visual representation has an identifier to identify the collection and graphical content representing the media objects.
摘要:
Techniques for introducing devices to device families. Membership in a device family allows a device certain privileges such as the ability to engage in secure communications with another device in the same device family. A device is made a member of a device family by communicating to the device from a base station a ticket that is representative of the device family. The base station may also generate a paper receipt confirming the membership of the device in the device family.
摘要:
A method and apparatus is disclosed herein for enhancing accuracy of jumping by incorporating interestingness estimates. In one embodiment, the method comprises serially displaying a sequence of page images; receiving a user input to stop sequencing through the page images; determining a location of a page image in the sequence of page images representing a point at which the user intended to stop in the sequence of page images but for display speed of the sequence of images and user reaction time in providing an indication of the point at which the user intended to stop, the location being selected based on visual distinctiveness of the page image at the location and the reaction time associated with the user; and automatically jumping back to the page image at the location in the sequence of page images.
摘要:
Techniques for generating fingerprints for articles and using the fingerprints for various applications. Scan-related parameter values, including the area of an article scanned, may be specified and varied from one scan to another for collecting data points used for generating fingerprints for articles. A paper shredder is provided that is configured to, prior to shredding a paper sheet, scan the paper sheet and generate a fingerprint for the paper sheet. Fingerprints may also be generated for media keys that are used to access media data. The fingerprint generated for a media key may be used to authenticate the media key. Access to media data corresponding to the media key may be made contingent on successful authentication of the media key.
摘要:
A method and apparatus for logging based identification are described. In one embodiment, the method comprises extracting entries of a hash chained log that represents a series of previous transactions. The method may also comprise ordering hash values of the entries extracted from the hash chained log into an ordered list. In one embodiment, the method may further comprise producing a cryptographic hash of the ordered list.