Abstract:
A system (10) for generating an incrementally completed 3D security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program has computer readable code for selecting a color transformation process at each stage in a workflow associated with the 3D security mark (20′″); computer readable code for selecting a scrambling technique for data to be placed into a carrier object (20, 20′, 20″, 20′″) of the 3D security mark (20′″) at each stage in the workflow; computer readable code for selecting a manner in which a state change of the carrier object (20, 20′, 20″, 20′″) at each stage in the workflow results in a predictable change in the 3D security mark (20′″); and computer readable code for weighting writing schemes at each stage in the workflow. The system (10) further includes further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
A system (10) for generating an incrementally completed 2D security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program has computer readable code for selecting a symbology for the 2D security mark (20′″), computer readable code for selecting a scrambling technique for data to be placed into a carrier object (20, 20′, 20″, 20′″) of the 2D security mark (20′″) at each stage in the workflow, and computer readable code for selecting a manner in which a state change of the carrier object (20, 20′, 20″, 20′″) at each stage in the workflow results in a predictable change in the 2D security mark (20′″). The system the system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
An embodiment provides a method for compression of a real-time surveillance signal. This method includes receiving a signal from a monitoring device and analyzing the signal to be monitored to compute spectral content of the signal. This method also includes computing the information content of the signal and determining a count of a number of coefficients to be used to monitor the signal. This method includes deploying a strategy for computing a plurality of coefficients based on the spectral content of the signal and the count of the number of coefficients to be used for monitoring the signal. This method further includes monitoring the signal and resetting the system in the case of above-threshold changes in a selected portion of the plurality of coefficients.
Abstract:
A covert label. A substrate comprises a field of ink. Disposed within the field of ink, is ink that can be preferentially removed according to a preconfigured pattern. The preconfigured pattern comprises information associable with at least one object.
Abstract:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.
Abstract:
The present disclosure includes a system and method for a service recommendation service. A method for a service recommendation service includes determining one or more queries that do not expose additional data items stored in a data source of a participant in a collaborative information system than are exposed by queries already implemented on the participant's data source. Query services that are not authorized to involve the data source, but which use the determined one or more queries are identified. The identified query services are recommended to the participant.
Abstract:
A method of determining whether a mass serialization engine is cryptographically secure is provided herein. The method includes performing (202) a specified number of mass serializations to generate a corresponding number of mass serialization sets. A size of the mass serialization sets is increased from a first portion size to a second portion size by the mass serialized engine. The method further includes determining (204) a corresponding number of collisions for each of the specified number of mass serializations. Additionally, the method includes comparing (206) the number of collisions to an expected number of collisions. Further, the method includes determining (208) whether the mass serialization engine is cryptographically secure based on the comparison.
Abstract:
A system for performing task execution in a workflow includes a processor device, at least one modular device having a digital microscope that is interchangeably coupled to the processor device, a memory device coupled to the processor device comprising instructions that when executed by the processor device execute a software service, a network interface, and an electronic workflow system coupled to the processor device via the network interface. The digital microscope corresponds to at least one particular task of a workflow to authenticate a workflow item using discrepancy detection, and the software service controls operation of the at least one modular device and generates forensic metadata from task information received by the digital microscope of the at least one modular device for the electronic workflow system.
Abstract:
Document management system includes a composite document (CD) and a mixed workflow, which includes an unordered stage followed by one of i) an ordered stage or ii) another unordered stage. The system includes a map-file (map) of the document (CD) for a participant (P) in the mixed workflow that is associated with the ordered or other unordered stage, and a wrap (W) of the map-file (map). Wrap (W) includes a number of map-file fragments (F) equal to or greater than a number of workflow participants (P) within a group (G) associated with the unordered stage. The number of map-file fragments (F) renders the document (CD) inaccessible to the participant (P) that is associated with the ordered or other unordered stage until each of the number of map-file fragments (F) is released by each of the workflow participants (P) within the group (G).
Abstract:
System call interception is activated for an application process. It is recorded that system call interception is active for the application process. Ongoing checking is performed to determine whether system call interception remains active.