Abstract:
An apparatus has a surface that includes a two dimensional barcode and a Radio Frequency Identification (RFID) antenna printed on the two dimensional barcode. The RFID antenna and the two dimensional barcode are formed from a conductive ink.
Abstract:
Methods, and apparatus for performing methods, for selecting a classifier engine. Methods include, for two or more portions of a set of items of known classification, classifying members of each portion using a particular classifier engine; selecting a portion of the set of items whose classifications satisfy a first criteria; classifying members of the selected portion of the set of items using two or more classifier engines; and selecting a classifier engine whose classification of the selected portion of the set of items satisfies a second criteria.
Abstract:
An embodiment of a two-dimensional barcode has a number of regions. A first region of the number of regions comprises black and white modules and one or more first colored modules. The one or more first colored modules encode data that is readable by reading the one or more first colored modules as white modules and different data that is readable by reading the one or more first colored modules based on their color. A second region of the number of regions comprises black and white modules only or comprises black and white modules and one or more second colored modules. The one or more second colored modules encode data that is readable by reading the one or more second colored modules as white modules and different data that is readable by reading the one or more second colored modules based on their color.
Abstract:
Disclosed herein are techniques for obscuring Internet tendencies. It is determined whether a user tends to access a category of information over the Internet more than an average user. If the user accesses the category of information over the Internet more than the average user, a user profile associated with the user is adjusted such that the user profile is proportional to an average user profile associated with the average user.
Abstract:
A method for decoding information from a physical image having a plurality of payload patches includes generating a digital representation of the physical image. A plurality of regions are mapped to the plurality of payload patches in the digital representation. A scramble pattern is identified and the plurality of mapped regions of the digital representation are reordered according to the identified scramble pattern. Information is decoded from the payload patches of the reordered plurality of mapped regions.
Abstract:
A method for creating a security campaign includes generating, via a first source, a first security deterrent for at least one non-security purpose; and generating, via a second source, a second security deterrent for a security purpose. The first and second deterrents are incorporated into a single security campaign.
Abstract:
Example embodiments disclosed hereto relate to generating a regressive information object. Information is encoded into an information object at states in a workflow. Information is encoded such that information encoded in a last state in the workflow is readable by an information object reader and information encoded in states prior to the last state is not readable by the information object reader.
Abstract:
A data leak prevention system includes an application, having source code that is unavailable or non-modifiable, resident on a client device. A system call is emittable by the application as a result of an action, and is to take place before a data leak event can occur. The action involves a document and i) latest full contents of the document, ii) metadata of the document, or iii) a combination of the latest full contents and the metadata. A system call interceptor agent is also resident on the client device. The interceptor agent includes a system call interceptor to intercept the system call emitted by the application and to suspend the system call. The system also includes a policy decision engine to analyze at least some of i) the latest full contents, ii) the metadata, or iii) the combination, and implement a policy action based upon the analysis.
Abstract:
Methods, and apparatus for performing methods, for selecting a classifier engine. Methods include, for two or more portions of a set of items of known classification, classifying members of each portion using a particular classifier engine; selecting a portion of the set of items whose classifications satisfy a first criteria; classifying members of the selected portion of the set of items using two or more classifier engines; and selecting a classifier engine whose classification of the selected portion of the set of items satisfies a second criteria.
Abstract:
A data leak from a computer can be prevented by intercepting one or more system calls from an unknown application and applying different policies to the intercepted action associated with the system call(s) depending on the data itself and the metadata of a document associated with the system call.