Abstract:
In an example, a data structure comprises a first genesis record having an associated authentication value and a plurality of subsequent records arranged in an order, wherein at least one subsequent record includes the authentication value associated with the first genesis record and an authentication value associated with another record in the data structure. A method may include designating one of the subsequent records as a second genesis record, acquiring an authentication value for the second genesis record, deleting at least one record preceding the second genesis record in the data structure and adding a further record to the data structure wherein the further record includes the authentication value of the second genesis record and an authentication value associated with a directly preceding record in the data structure.
Abstract:
Examples disclosed herein relate to receiving a request to perform an operation on a document, determining whether the document complies with a plurality of operation policies, and in response to determining that the document complies with the plurality of operation policies, providing a notification that the operation is ready to be performed and digitally signing the document.
Abstract:
According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided.
Abstract:
Examples disclosed herein relate to receiving a request to perform an operation on a document, determining whether the document complies with a plurality of operation policies, and in response to determining that the document complies with the plurality of operation policies, providing a notification that the operation is ready to be performed and digitally signing the document.
Abstract:
A composite document comprises a publicly posted composite document including a plurality of parts, a map-file for each participant in a workflow associated with the composite document, and a set of encryption keys. The encryption keys are associated with at least one of the plurality of parts and distributed via the map file to the participants. At least one of the parts of the composite document, associated with the encryption keys, includes workflow processing instructions. The workflow processing instructions are enactable by the multifunction printer independent of a server and automate at east some steps of the workflow for participant at the multifunction printer via resident functions of the multifunction printer.
Abstract:
Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
Abstract:
A method for regulating document access, the method comprising providing a set of access keys for a user, respective ones of the keys providing different user access privileges for components of a composite document, selecting multiple nodes in a distributed storage system, distributing data representing N fragments of encrypted or unencrypted versions of the set of access keys and/or at least one of the individual keys and/or a symmetric key. K, associated with the user across N selected nodes of the distributed storage system, wherein the encrypted versions are encrypted using the symmetric encryption key. K, associated with the user, encrypting data relating to address information of the N selected nodes using a public encryption key of the user to generate a location object and storing the location object as a component of the composite document.
Abstract:
According to one example, a first computer system receives at least one request by at least one workflow participant to access a composite document content-part from a second computer system. The first computer system retrieves at least one encrypted bundle from the composite document for the at least one workflow participant, decrypts the encrypted bundle using a private key, and ascertains whether at least one rule retrieved from the decrypted bundle is satisfied. In the event that at least one rule is satisfied, the first computer system releases a token from the decrypted bundle to the second computer system to access the composite document content-part.
Abstract:
In an example, a method includes acquiring, at a processor, first object model data representing a first three-dimensional object. A portion of the first object model data representing an object region to be concealed may be identified using the processor. The first object model data may be transformed, using the processor, to determine second object model data representing a modified first three-dimensional object which is distended in the object region represented by the identified portion of the first object model data.
Abstract:
A callback, which may be assigned to a creation event of an application process, may be executed. In response to the execution of the callback, a data flow control object may be injected into the application process. The data flow control object may be to intercept a system call made by the application process and to control flow of data handled by the system call.