Abstract:
Methods and apparatus for managing document workflow, including generating a nonce for providing participant access for a particular step of the document workflow, generating a first number of nonce elements, and assigning nonce elements to a plurality of participants of a step of the document workflow preceding the particular step in a one-to-one correspondence. The nonce is determinate from a number of the nonce elements that is greater than or equal to a second number and less than or equal to the first number.
Abstract:
A workflow order is created for the object. Public parameters are received from a key generation center at a computer associated with an object master. A public key is generated at the computer system based on a user identifier and the public parameters, wherein the user identifier is comprised of user related information. The object is encrypted using the public key such that the object cannot be opened without the a private key, wherein the object is a composite document comprising multiple elements of documents of different formats, and wherein the private key is generated in response to a request from an authenticated user using the user identifier at the key generation center. Access to the multiple elements of the object is controlled based on workflow order.
Abstract:
A method for creating a security campaign includes generating, via a first source, a first security deterrent for at least one non-security purpose; and generating, via a second source, a second security deterrent for a security purpose. The first and second deterrents are incorporated into a single security campaign.
Abstract:
A method and system for providing recording device privileges through biometric assessment are disclosed herein. An embodiment of the method includes monitoring information associated with a recording device. The information includes a recording device location, dynamic biometric data, knowledge data, and recording device identification data. From the monitored information, an identity of a then-current user of the recording device is determined. An authorization level for the then-current user is determined, and recording device access privileges are dynamically adjusted based on the determined authorization level.
Abstract:
Disclosed is a document analysis system and method. The document analysis system includes an interim analyzer configured to perform an interim document analysis to identify a number of interim regions on a digital document at an interim pixels-per-inch (PPI). The document analysis system also includes a complete analyzer configured to perform a complete analysis on at least one of the interim regions at a second PPI, thereby generating at least one complete region therefrom. The document analysis system and method provides significant flexibility to the user with a number of options relative to the analysis of the regions of information of interest in a digital document and to limit analysis to such preferred regions.
Abstract:
A system and method for propagating data from one file format to another file format analyzes the file format of saved data to determine whether the file can be opened by the requesting application program. If the file is of a format or version different than that of the requesting application program, the data propagation logic analyzes the file to determine the available file formats attached thereto and launches an executable module, either attached to the file or remotely accessible via a resource indicator, to convert the file to a new file of a format and/or version readable by the requesting application program.