Abstract:
A method of extracting data embedded in a 3D object includes a 3D scanning device scanning a 3D object and extracting data embedded as physical representations in the 3D object. A processing device will identify, from the extracted data, instructions for causing the processing device to perform an action such as identifying building instructions for printing a copy of the 3D object. The processing device will also perform the action to identify the building instructions, and cause a 3D printer to use the building instructions to print the copy of the 3D object. The processing device may be part of the 3D scanning device or part of another device or system that is in communication with the 3D scanning device.
Abstract:
A method of extracting data embedded in a 3D object includes a 3D scanning device scanning a 3D object and extracting data embedded as physical representations in the 3D object. A processing device will identify, from the extracted data, instructions for performing an action on the data such as: displaying at least a portion of the data, transmitting at least a portion of the data to an external database, transmitting at least a portion of the data to an external application, or receiving user input for handling the data. The processing device may be part of the 3D scanning device or part of another device or system that is in communication with the 3D scanning device. The method includes performing the action, and returning a result of the action to a user of an electronic device. It may also include receiving a user selection of the portion of the data.
Abstract:
Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.
Abstract:
A method of processing a specification may include receiving, by a home site, information regarding a search for at least one good or service, automatically generating, by the home site, a specification comprising a command block, an origin block and a routing block, based on the received information, and transmitting, by the home site, the specification to the one or more destination marketplaces. One or more of the command block, the origin block and the routing block may include one or more domain-specific language instructions. The command block may include one or more instructions defining the search and one or more instructions defining one or more actions to perform with respect to results of the search. The origin block may include information identifying the home site. The routing block comprises information identifying one or more destination marketplaces.
Abstract:
A method and system of producing a three-dimensional object with an anti-counterfeiting measure uses a processor to access a data file including a plurality of parameters for producing a three-dimensional object, wherein the parameters comprise a plurality of structural parameters. The processor may also cause a three dimensional printing device to form the three dimensional object that exhibits the structural parameters by identifying a build material, identifying a concealment material, causing the three dimensional printing device to deposit a mixture of the build material and the concealment material in a plurality of layers, and causing the three dimensional printing device to cure the build material and concealment material to form the three-dimensional object with the anti-counterfeiting measure.
Abstract:
Systems and methods of analyzing message data. An embodiment is a method of analyzing message data including a plurality of messages associated with one or more users. The method is performed using a computing system comprising a computer storage medium and a computer processor. The system parses each message of the plurality of messages to identify a plurality of message segments. The system assigns the message segments to the one or more users. The assignment is based at least in part on a determination of whether each message of the plurality of messages is a reply message. The segments of the message are assigned to a reply user if the message is determined to be a reply message. The system applies a statistical model to the assigned message segments, to determine predicted locations for the users. The system outputs the predicted locations for the users.
Abstract:
A method of extracting data embedded in a 3D object includes a 3D scanning device scanning a 3D object and extracting data embedded as physical representations in the 3D object. A processing device will identify, from the extracted data, instructions for causing the processing device to perform an action such as identifying building instructions for printing a copy of the 3D object. The processing device will also perform the action to identify the building instructions, and cause a 3D printer to use the building instructions to print the copy of the 3D object. The processing device may be part of the 3D scanning device or part of another device or system that is in communication with the 3D scanning device.
Abstract:
A method and system of producing a three-dimensional object with an anti-counterfeiting measure uses a processor to access a data file including a plurality of parameters for producing a three-dimensional object, wherein the parameters comprise a plurality of structural parameters. The processor may also cause a three dimensional printing device to form the three dimensional object that exhibits the structural parameters by identifying a build material, identifying at least one anti-counterfeiting measure that when included in the 3D object will prevent creation of a digital model of the three-dimensional object by causing the 3D object to obstruct a possible 3D scanning method, and causing the three dimensional printing device to form the three-dimensional object with the anti-counterfeiting measure using the build material.
Abstract:
A method and system of producing a three-dimensional object with an anti-counterfeiting measure uses a processor to access a data file including a plurality of parameters for producing a three-dimensional object, wherein the parameters comprise a plurality of structural parameters. The processor may also cause a three dimensional printing device to form the three dimensional object that exhibits the structural parameters by identifying a build material, identifying a concealment material, causing the three dimensional printing device to deposit a mixture of the build material and the concealment material in a plurality of layers, and causing the three dimensional printing device to cure the build material and concealment material to form the three-dimensional object with the anti-counterfeiting measure.
Abstract:
A method of creating a secure audit trail for transactions may include, by a host electronic device, for each of a plurality of transactions, receiving, from a client electronic device, a transaction details document that summarizes the transaction, generating a document hash by performing a first cryptographic hash function on the received transaction details document, and identifying metadata associated with the transaction. The method may include generating an entry hash associated with the plurality of transactions by performing a second cryptographic hash function on at least the document hash of each transaction in the plurality of transactions and the metadata associated with each transaction in the plurality of transactions, and storing the entry hash in an entry in a transaction log database.