摘要:
An apparatus, method, system, and computer-readable medium are provided for maintaining contact information associated with a contact. In some embodiments a request associated with a contact may be received. Contact information may be obtained from one or more external or internal sources. One or more confidence scores may be generated for the obtained contact information and for one or more values received with the request. Based on the confidence score(s), one or more values associated with the contact may be incorporated in one or more data stores. In some embodiments, suggestions for contact related information may be generated. Responses to the suggestions may be used to update the generated confidence score(s).
摘要:
An apparatus, method, system, and computer-readable medium are provided for maintaining contact information associated with a contact. In some embodiments a request associated with a contact may be received. Contact information may be obtained from one or more external or internal sources. One or more confidence scores may be generated for the obtained contact information and for one or more values received with the request. Based on the confidence score(s), one or more values associated with the contact may be incorporated in one or more data stores. In some embodiments, suggestions for contact related information may be generated. Responses to the suggestions may be used to update the generated confidence score(s).
摘要:
An apparatus, method, system, and computer-readable medium are provided for maintaining contact information associated with a contact. In some embodiments a request associated with a contact may be received. Contact information may be obtained from one or more external or internal sources. One or more confidence scores may be generated for the obtained contact information and for one or more values received with the request. Based on the confidence score(s), one or more values associated with the contact may be incorporated in one or more data stores. In some embodiments, suggestions for contact related information may be generated. Responses to the suggestions may be used to update the generated confidence score(s).
摘要:
An apparatus, method, system, and computer-readable medium are provided for maintaining contact information associated with a contact. In some embodiments a request associated with a contact may be received. Contact information may be obtained from one or more external or internal sources. One or more confidence scores may be generated for the obtained contact information and for one or more values received with the request. Based on the confidence score(s), one or more values associated with the contact may be incorporated in one or more data stores. In some embodiments, suggestions for contact related information may be generated. Responses to the suggestions may be used to update the generated confidence score(s).
摘要:
A method for resetting a pin on an access card is disclosed. The method includes generating a server authentication (SA) public key and an SA private key and attempting a write of the SA public key to the access card over a non-secure channel. The method further includes determining if the access card currently contains an existing SA public key. The attempted write of the SA public key is handled by one of: (i) completing the attempted write of the SA public key to the access card over the non-secure channel if it is determined that the access card did not contain an existing public key; (ii) denying the attempted write of the SA public key to the access card over the non-secure channel if it is determined that the existing SA public key matches the SA public key that is attempted by the write; and (iii) denying the attempted write of the SA public key to the access card over the non-secure channel if it is determined that the existing SA public key does not match the SA public key that is attempted by the write.
摘要:
A method for resetting a pin on an access card is disclosed. The method includes generating a server authentication (SA) public key and an SA private key and attempting a write of the SA public key to the access card over a non-secure channel. The method further includes determining if the access card currently contains an existing SA public key. The attempted write of the SA public key is handled by one of: (i) completing the attempted write of the SA public key to the access card over the non-secure channel if it is determined that the access card did not contain an existing public key; (ii) denying the attempted write of the SA public key to the access card over the non-secure channel if it is determined that the existing SA public key matches the SA public key that is attempted by the write; and (iii) denying the attempted write of the SA public key to the access card over the non-secure channel if it is determined that the existing SA public key does not match the SA public key that is attempted by the write.
摘要:
The embodiments of the present invention provide a method for comparing file tree descriptions and generating a sequenced log of changes that transform an old file tree to a new file tree. According to one embodiment, the inputs to this comparator are two tree-structured descriptions called file tree indices, and the outputs are a sequence of file tree operations that can transform the old tree to the current tree. According to another embodiment, the comparator has two top level steps, where at step one it recursively goes through the old file tree index and compares each folder along with its children with that of the corresponding file tree generating a raw operation log, and at step two after the recursion is done, the comparator processes the raw operation log and optimizes certain sets of operations by transforming them into single operations.
摘要:
The embodiments of the present invention provide a method for resolving conflicting changes encountered when reconciling parallel user changes to two synchronized trees of folders and files. According to one embodiment, these conflicts are presented to the user as an interface that requires an indication from the user to the winner of the conflict. According to another embodiment, since certain conflicts cannot be resolved independently, they have to be combined and presented to the user as a single conflict. According to yet another embodiment, after the user has indicated which operations are the winners of all or some of the conflicts, the winning operations are applied to the file tree with which they are in conflict.
摘要:
Methods and systems are provided for reconciling any changes that have occurred in two file trees since they were last synchronized. A reconciler takes as input two logs of the changes made in the respective file trees. The first log resides on a client computing device, and the second log resides on a server computing device. The reconciler outputs two sets of changes that need to be applied to the respective file trees in order to synchronize them. The reconciler detects and outputs a list of changes that conflict with each other.
摘要:
Digital images, such as radiological images, are evaluated using correlative properties of information contained in a pixel and adjacent pixels. Each pixel is evaluated according to its own properties and adjacent pixels. Each pixel is identified as either satisfying a predefined criteria or not satisfying the criteria based on how many of the pixel and adjacent pixels satisfy a correlative property. A binary array is formed with the pixels satisfying the predefined criteria being nonzero and the other pixels being zero. The image being evaluated is divided into predefined blocks of pixels, and the number of nonzero pixels in each of the blocks is divided by the predefined number of pixels in the blocks to produce a ratio for each block. Image intensity is set for each of the blocks according to the ratio. Correlative information from corresponding pixels across different images of the same object can also be evaluated.