Abstract:
A method and system secures an encryption key for utilization on a secured network by receiving, at a trusted node, an encryption key request from a requesting node, the encryption key request including a public encryption key of a public/private encryption key pair associated with the requesting node; determining, at the trusted node, if the requesting node has previously supplied enough virtual currency to support the request; choosing an encryption key for distributing to the requesting node when it is determined the requesting node has enough virtual currency; encrypting the chosen encryption key with the public encryption key of a public/private encryption key pair associated with the requesting node; and sending the encrypted encryption key to the requesting node.
Abstract:
An apparatus, method and non-transitory computer readable medium for developing a query on a social media service are disclosed. For example, the apparatus includes a processor and a computer readable medium storing a plurality of instructions, which when executed by the processor, cause the processor to perform operations for developing the query on the social media service. The operations include receiving a keyword, providing an option to select a sentiment and an option to include a time frame, finding a plurality of related keywords based on the keyword, the sentiment that is selected and the time frame that is selected using one or more external databases, generating the query using the keyword and all of the plurality of related keywords and the time frame that is selected and applying the query to the social media service.
Abstract:
A method and system of producing a three-dimensional object with an anti-counterfeiting measure uses a processor to access a data file including a plurality of parameters for producing a three-dimensional object, wherein the parameters comprise a plurality of structural parameters. The processor may also cause a three dimensional printing device to form the three dimensional object that exhibits the structural parameters by identifying a build material, identifying at least one anti-counterfeiting measure that when included in the 3D object will prevent creation of a digital model of the three-dimensional object by causing the 3D object to obstruct a possible 3D scanning method, and causing the three dimensional printing device to form the three-dimensional object with the anti-counterfeiting measure using the build material.
Abstract:
Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.
Abstract:
A method and system for embedding a database in a 3D object uses a 3D dimensional printing device and a computer-readable memory that stores a build sequence comprising instructions that, when executed by a processor, will cause the 3D printing device to form a three-dimensional object by depositing layers of build material and by including, in one or more of the layers, physical representations that represent a data set that includes a record of information for production of the 3D object.
Abstract:
Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.
Abstract:
According to embodiments illustrated herein, there is provided a method for recommending one or more first tasks to one or more workers. The method includes determining a first score for a count of transactions, a second score for each of one or more locations based on a result of one or more second tasks in each of the one or more locations, and a third score for each of one or more industries based on a result of the one or more second tasks in each of the one or more industries. The method further includes ranking the one or more first tasks based on at least the first score, the second score, the third score, and one or more attributes associated with the one or more first tasks. Thereafter, the ranked one or more first tasks are presented to the one or more workers.
Abstract:
Embodiments relate to systems and methods for interactive creation of privacy safe documents. In aspects, an online document processing system can be configured to include a text editor with a set of privacy controls. The text editor can interact with a remote privacy engine to scan an original document entered by a user, to seamlessly detect potentially sensitive data such as medical information contained in that document as it is entered. When potentially sensitive data is identified, for instance by checking the entered content, data fields or formats of a Web form, the privacy engine can generate text substitution data to transmit to the text editor. Potentially sensitive data, such as social security numbers or other personal or private identifiers, can therefore be masked redacted to export to Web sites, users or services without exposing potentially sensitive data.
Abstract:
Systems and methods of data analytics, which in various embodiments enable business analysts to apply certain machine learning and analytics algorithms in a self-service manner by binding them to generic business questions that they can be used to answer in particular domains. The general approach may be to define the application of an algorithm to solve specific problems (questions) for particular combinations of a business domain and a data category. At design time, the algorithm may be linked to canonical data within a data category and programmed to run with this canonical data set. At runtime, given a dataset and its category, and a business domain, a user may choose from the corresponding questions and the system may run the algorithm bound to that question.
Abstract:
A method of producing a variable data design file for use in production of personalized copies of a reference 3D object may include receiving a plurality of fixed structural parameters for a reference object and receiving information for creation of a plurality of variable structural parameters corresponding to variable data regions on the reference 3D object. The method may include using the plurality of fixed structural parameters to develop an instruction set configured to cause a 3D printing device to form a 3D object that exhibits the plurality of fixed structural parameters; and including, in the instruction set, instructions for creating the plurality of variable structural parameters based on the received information that will cause the 3D printing device to render at least one of the plurality of variable data regions in the 3D object, wherein the variable data region differs from a corresponding region of the reference 3D object.