摘要:
The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.
摘要:
The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.
摘要:
Tamper-tolerant programs enable correct and continued execution despite attacks. Programs can be transformed into tamper-tolerant versions that correct effects of tampering in response to detection thereof Tamper-tolerant programs can execute alone or in conjunction with tamper resistance/prevention mechanisms such as obfuscation and encryption/decryption, among other things. In fact, the same and/or similar mechanisms can be employed to protect tamper tolerance functionality.
摘要:
Cover authoring systems and methods for automatically composing a final content layout for a cover, including spinal content formatted to accommodate the width and height dimensions of the book spine, are described. By automatically computing the typeface parameter values based upon the selected visual fit model, this cover authoring scheme enables users to avoid the time consuming, laborious and expensive process of manually composing the final cover content layout with a conventional graphics program.
摘要:
A system for distributing digital content over a computer network (e.g., the Internet) uses certificates to establish a trust relationship between a content provider and a display device. The certificates identify the display device and the content provider as well as unique characteristics of the distribution. For example, the content provider may be a book publisher and the display device may be a printer/binder.
摘要:
Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information to be encoded, and a base image is modulated with a graphical encoding of the signed message to produce a marked image. In another aspect, a signed message is extracted from a marked image based upon a comparison of the marked image and a base image. The extracted signed message is decoded to produce a decoded message. Information encoded in the marked image is extracted from the decoded message and authenticated.
摘要:
Payment indicia generating schemes are described that enable users to customize the appearance of the payment indicium and to accommodate a wide variety of validation processing environments, while providing a substantial defense against fraudulent photocopy attack. In some embodiments, a corroborative digital token is generated from payment information, and a base image is modulated with a graphical encoding of the corroborative digital token to produce a payment indicium. In some embodiments, a payment indicium containing embedded payment information is rendered on a printing surface with a printing characteristic that degrades with photographic reproductions such that the embedded payment information is extractable from an original rendering of the payment indicium but is un-extractable from a photographic reproduction of an original rendering of the payment indicium. In some embodiments, payment information is encoded into a corroborative digital token based at least in part upon one or more variable encoding parameters, and a payment indicium containing the encoded payment information is rendered.
摘要:
Programs running on an open architecture, such as a personal computer, are vulnerable to inspection and modification. This is a concern as the program may include or provide access to valuable information. As a defense, the actual location of data can be hidden throughout execution of the program by way of periodic location reordering and pointer scrambling, among other things. These techniques serve to complicate static data flow analysis and dynamic data tracking thereby at least deterring program tampering.
摘要:
Programs running on an open architecture, such as a personal computer, are vulnerable to inspection and modification. This is a concern as the program may include or provide access to valuable information. As a defense, the actual location of data can be hidden throughout execution of the program by way of periodic location reordering and pointer scrambling, among other things. These techniques serve to complicate static data flow analysis and dynamic data tracking thereby at least deterring program tampering.
摘要:
A system for distributing digital content over a computer network (e.g., the Internet) uses certificates to establish a trust relationship between a content provider and a display device. The certificates identify the display device and the content provider as well as unique characteristics of the distribution. For example, the content provider may be a book publisher and the display device may be a printer/binder.