摘要:
The present invention provides processor-implemented method and system of creating an assured execution environment for at least one computer program executable on a computer system. In an exemplary embodiment, the method and system include (1) converting the executable into a computer program targeted for the computer system, where the converting includes scrambling the executable by applying an encryption scheme to the executable and (2) executing the program on the computer system only if the program complies with a policy.
摘要:
The present invention provides a method and system of creating an assured execution environment (AxE) for at least one computer program executable on a computer system. In an exemplary embodiment, the method and system include (1) converting the executable into a computer program targeted for the computer system and (2) providing the environment in which the program can be accessed on the computer system. In an exemplary embodiment, the converting includes scrambling the executable. In an exemplary embodiment, the converting includes attaching filesystem metadata to the executable. In an exemplary embodiment, the providing includes executing the program on the computer system only if the program complies with a policy. In an exemplary embodiment, the providing includes preventing malicious code from executing on the computer system before the environment is loaded on the computer system.
摘要:
Embodiments of the invention relate to manipulating the original content of at least one original read-only computer file in a file-system of a computer system, where the computer system includes an operating system including a framework for in-line monitoring of accesses to the file-system. An exemplary embodiment, includes transforming the original content via a non-length-preserving data transformation algorithm, thereby resulting in transformed content, storing the transformed content in a transformed computer file, splitting the transformed computer tile into a first file and a second file, and associating the first file with the second file in the file-system. The non-length-preserving data transformation algorithm includes a length-increasing data transformation algorithm.
摘要:
The present invention provides a method and system of manipulating the original content of at least one original read-only computer file in a computer file-system in a computer system, where the computer system includes an operating system including a framework for in-line monitoring of accesses to the file-system. In an exemplary embodiment, the method, system, and service include (1) transforming the original content via a non-length-preserving data transformation algorithm, thereby resulting in transformed content, (2) storing the transformed content in a transformed computer file, (3) splitting the transformed computer file into a first file (F13 1) and a second file (F—2), and (4) associating the first file (F—1) with the second file (F—2) in the file-system. In an exemplary embodiment, the non-length-preserving data transformation algorithm includes a length-increasing data transformation algorithm (i.e., encryption).
摘要:
Methods of fabricating a waveguide module are presented that include the steps of providing a glass substrate having first and second substantially planar parallel surfaces and comprising one or more cells in a first arrangement and singulating the glass substrate to produce one or more singulated cells. Singulated cells are treated with a chemical agent, laminated to a carrier substrate, processed, and delaminated from the carrier wafer and optionally subjected to further processing.
摘要:
Eyewear including a see-through display including an optical waveguide module and one or more integrated antennas. In one example, the antenna is disposed on one of the non-active waveguide substrates, which non-active waveguide substrates are used as encapsulants to protect the waveguide active layer from environmental factors and do not have an active optical function in the waveguide operation. In another example, the antenna is disposed on one of the active waveguide substrate surfaces opposite another active waveguide substrate. As a result, there is a large lee-way available in patterning desired antenna shapes, length, and area on these surfaces using optically transparent, high conductivity materials. The antenna is not subject to some design constraints and compromises.
摘要:
Systems, devices, and methods including one or more code rings, each code ring comprising one or more sides on an outer surface and one or more code ring alignment indentations on an inner surface; and one or more inner combination rings, each inner combination ring comprising one or more inner combination ring alignment protrusions on an outer surface and a combination indentation on an inner surface; where each of the one or more code ring alignment indentations receive each of the one or more inner combination ring alignment protrusions, where each inner combination ring may be removable and rotatable relative to each code ring of the one or more code rings, and where the combination indentation may be proximate an unlocked side of each of the one or more code rings.
摘要:
An approach is provided for chat-based crisis management services. A crisis situation is recognized based on one or more events. Individuals needed for crisis management are identified and a bridge communication channel for a plurality of the identified individuals is facilitated. Data is shared among the identified individuals that participate in a chat session on the bridged communication channel. Dated exchanged among the participants is stored during the chat session. Access to the stored chat data is provided to the participants.
摘要:
Systems and methods for defining a form navigational structure associated with at least one node in a process flow may comprise selecting a node form for the at least one node in the process flow, the node form identifying a plurality of displayable forms. Furthermore, the systems and methods may include defining a plurality of node steps for the node, each node step corresponding to a displayable screen associated with a subset of the plurality of displayable forms. Moreover, the systems and methods may include establishing a hierarchical tree structure associating the plurality of node steps, branches in the hierarchical tree structure having associated validation rules.
摘要:
An approach is provided for virtual agent session monitoring and barge-in. A platform monitors content of a communication session between a virtual agent and a user and determines whether the content satisfies a pre-defined rule. Further, the platform selectively initiates a barge-in of the communication session by a live agent based on the determination.