摘要:
A computer-readable medium is encoded with a method of externalizing legacy data from a legacy database on a data resource into an Extensible Markup Language (“XML”)-compliant format where the format is specified by an automatically generated XML meta-description, thus enabling access and processing of legacy data by XML-compliant applications.
摘要:
Methods, systems and apparatus for facilitating access by a user to a resource of an on-line service via a data communications network, the resource being accessible via an entry page of the service. A method includes checking whether a user condition, prestored in the network, is satisfied, the user condition being associated with the user and relating to the resource. If the condition is not satisfied, the entry page is sent to the user via the network. If the condition is satisfied, the entry page is modified by adding an indication relating to the resource. The modified entry page in then sent to the user advantageously, the method also includes transmitting to the user a notification message in response to, and indicative of, the condition being satisfied.
摘要:
A method of preserving privacy and confidentiality in a system where information is associated with an existing web page having an address. The method includes receiving a store command from a first user system, the store command including at least a database key and information to be associated with the web page, wherein the database key was created by performing a cryptographic hash function on the address of the web page; storing the information at a location in a storage database; associating the location with the database key; receiving a retrieve command from a second user system, the retrieve command including the database key calculated by the second user system; retrieving stored information from one or more locations in the database associated with the database key; and transmitting the stored information to the second user system.
摘要:
A method of acquiring tags using web search includes receiving a search query in a search engine, processing the search query and returning a list of candidate resources corresponding to the search query, determining a candidate resource out of the list of candidate resources, extracting tags from the search query, and tagging the candidate resource with the extracted tags.
摘要:
A method is provided for adding intended meaning to digital signatures. A message, being base content, is received to be signed. Assertions, ontologies, and description of a reasoner are adjoined to the message. Ontologies are a formal specification of vocabulary and rules used to state the assertions. The reasoner validates the assertions against the corresponding ontologies. A compound message is formed including the message, the assertions, the ontologies, and the reasoner. The compound message is signed using a cryptographic digital signature, where the assertions indicate an intended meaning of the digital signature. During verification of semantic signatures, a digital signature is received for a compound message, where the compound message includes assertions, ontologies, and reasoner. The digital signature is verified, and the compound message structure is checked for semantic signature conformance. In response to proper verification, the reasoner is utilized to verify a conformance of the assertions to the ontologies.
摘要:
Electronic devices and methods of processing and preparing processing application data are disclosed. Application data are operated on a first electronic device (2a) and a copy of said application data is operated on at least another electronic device (2b). A method call for modifying application data on the first device (2a) is translated into a more general description. The description is passed to the other device (2b). The application data on the first device (2a) is processed according to the method call. On the second device (2b), the received description of the method call is translated into a locally executable method call which is processed on the copy of application data.
摘要:
A method and apparatus are provided for detecting peer-to-peer communication on a data communication network, between an internal client machine within an internal address space and an external client machine. The method includes routing all messages addressed to internal client machines to an analysis device. The analysis device identifies messages pertaining to peer-to-peer communication and identifies the internal client machine to which the messages of a specified nature were addressed. The analysis device terminates the connection with the external client machine if the establishing of the peer-to-peer communication is in violation of a pre-determined internal network rule.
摘要:
A method and apparatus are provided for detecting peer-to-peer communication on a data communication network, between an internal client machine within an internal address space and an external client machine. The method includes routing all messages addressed to internal client machines to an analysis device. The analysis device identifies messages pertaining to peer-to-peer communication and identifies the internal client machine to which the messages of a specified nature were addressed. The analysis device terminates the connection with the external client machine if the establishing of the peer-to-peer communication is in violation of a pre-determined internal network rule.
摘要:
Electronic devices and methods of processing and preparing processing application data are disclosed. Application data are operated on a first electronic device (2a) and a copy of said application data is operated on at least another electronic device (2b). A method call for modifying application data on the first device (2a) is translated into a more general description. The description is passed to the other device (2b). The application data on the first device (2a) is processed according to the method call. On the second device (2b), the received description of the method call is translated into a locally executable method call which is processed on the copy of application data.
摘要:
A method of preserving privacy and confidentiality in a system where information is associated with an existing web page having an address. The method includes receiving a store command from a first user system, the store command including at least a database key and information to be associated with the web page, wherein the database key was created by performing a cryptographic hash function on the address of the web page; storing the information at a location in a storage database; associating the location with the database key; receiving a retrieve command from a second user system, the retrieve command including the database key calculated by the second user system; retrieving stored information from one or more locations in the database associated with the database key; and transmitting the stored information to the second user system.