摘要:
Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the hierarchically structured information to unauthorized parties. The present techniques include encrypting the hierarchically structured information such that an arrangement of nodes and corresponding data of the hierarchically structured information is not exposed and each node includes a corresponding node identifier that is not encrypted and updating the hierarchically structured information by referring to the nodes using the node identifiers.
摘要:
The invention provides for encryption of hierarchically structured information. In one embodiment, a method is provided for encrypting hierarchically structured information. The hierarchically structured information includes a particular node and zero or more descendent nodes, each node having a name and zero or more additional data for the node. The name of the particular node is encrypted and the encrypted name is stored. The one or more descendent nodes are stored with the parent-child relationships of the one or more descendent nodes exposed. Additional data for the particular node may be encrypted. Further, some, none or all of the data for the descendent nodes may be encrypted.
摘要:
A single sign-on technique suitable for a network of devices with no centralized device or synchronized clocks such as a personal area network (PAN) is described. Responsive to a user signing-on to a first device via its user interface, the first device securely propagates authentication of the user for enabling one or more other devices in the network, each for a near-expiry time period measured from the device specific time of the respective device; thus providing for expiration of authentication to minimize how long data is vulnerable in case a device is lost or stolen. Described also is a device enabling protocol using authentication accumulation to secure against threats from a rogue device pretending to be another device in the network such as in man-in-the-middle and replay attacks.
摘要:
Techniques for verifying whether an incremental update was correctly applied to a set of hierarchically structured information include determining an overall integrity code for the hierarchically structured information and attaching the overall integrity code to the hierarchically structured information. An incremental update according to the present techniques includes an integrity code that is combined into the overall integrity code attached to the hierarchically structured information when the incremental update is applied to the hierarchically structured information. The integrity code of the incremental update is generated such that when the overall integrity code is recomputed it will match the overall integrity code attached to the hierarchically structured information if the incremental update was correctly applied.
摘要:
Techniques for performing an incremental update to a set of hierarchically structured information that do not expose the structure and content of the hierarchically structured information to unauthorized parties. The present techniques include encrypting the hierarchically structured information such that an arrangement of nodes and corresponding data of the hierarchically structured information is not exposed and each node includes a corresponding node identifier that is not encrypted and updating the hierarchically structured information by referring to the nodes using the node identifiers.
摘要:
Data representing an image of text is received, as is data representing the text in non-image form. A valid content boundary within the image of the text is determined. For each character within the text in the non-image form, a location of the character within the image of the text is determined. Where the location of the character within the image of the text falls outside the valid content boundary, the character is removed from the data representing the text in the non-image form.
摘要:
An average size of a plurality of page images is determined, and a size of a first one of the page images is determined. The size of the first page image is compared to the average size. If the size of the first page image is larger than the average size by a first predetermined amount and larger than the average size by less than a second predetermined amount, then the first page image is rotated for printing. If the size of the first page image is larger than the average size by at least the second predetermined amount, then the first page image s divided into multiple pages for printing.
摘要:
A method of providing content to users, with a tool incorporated in a website, includes searching a content database; selecting content from the database; and printing the selected content in book form. A system for providing content includes a content tool; and a service module. The content tool is incorporated in a website and is in communication with the service module. The content tool and service module allow visitors to the website to search, select and customize content located in a database accessible to the service module. The content tool and service module allow the visitors to order a copy of the content.
摘要:
A page of a digitally scanned document and graphical user interface elements (GUI) are displayed. Each GUI element corresponds to a potential flaw within the page and includes an example image of the potential flaw. After the GUI elements are displayed, a user is permitted to select a user-detected flaw present within the page of the digitally scanned document by selecting one of the GUI elements.
摘要:
Described is a solution for maintaining the security of encrypted data despite a compromised private key by using a re-encryption process that does not require decryption of the encrypted data. The compromised private key is re-encrypted using a new public key as is the encrypted symmetric key which the compromised private key can decrypt. When a decrypted version of the encrypted data is requested, the private key corresponding to the new public key decrypts both the encrypted version of the compromised private key and the re-encrypted version of the symmetric key resulting in the unencrypted compromised private key and the previously encrypted version of the symmetric key, which when decrypted using the compromised private key decrypts the encrypted data. The unencrypted symmetric key can then be encrypted using the new public key any encrypted compromised private key can be deleted.