Abstract:
A process discovery system that includes an offline system training module configured to cluster similar process log traces using Non-negative Matrix Factorization (NMF) with each cluster representing a process model, and learn a Conditional Random Field (CRF) model for each process model and an online system usage module configured to decode new incoming log traces and construct a process graph in which transitions are shown or hidden according to a tuning parameter.
Abstract:
A system and method for generating an aggregate document comprised of at least one sub-document. The system comprises a document management system on a first computing device connectable over a network with a user computing system on a second computing device remote from the first computing device. The document management system on the first computing device has access over the network to a plurality of databases including an aggregate document database, a license database, and a document repository database. Each of the first computing device and the second computing device have software code operationally installed thereon for effecting instructions for controlling certain aspects of each computing device. The software code on the first computing device is operational at least for controlling hardware components of the first computing device to create a builder subsystem configured to enable a user to generate at least one aggregate document.
Abstract:
There is provided a method and system to manage multiple levels of privacy in a document having a plurality of elements. In accordance with the method, a selection of a first element in the document is received. The first element is tagged with a selected first privacy level of a hierarchical privacy level list. The list includes a plurality of hierarchical levels of privacy associated with a controlling authority. A selection of a second element in the document is received. The selected second element is tagged with a selected second privacy level of the hierarchical privacy level list.
Abstract:
There is provided a method and system to manage multiple levels of privacy in a document having a plurality of elements. In accordance with the method, a selection of a first element in the document is received. The first element is tagged with a selected first privacy level of a hierarchical privacy level list. The list includes a plurality of hierarchical levels of privacy associated with a controlling authority. A selection of a second element in the document is received. The selected second element is tagged with a selected second privacy level of the hierarchical privacy level list.
Abstract:
The disclosed embodiments provide a convenient way for users to access segregated work spaces on mobile devices. A game-like multi-level interactive approach is used to prompt users for input to verify their identity. Multiple identity verification attributes can be collected at each level of interaction. Authentication is achieved when a settable level of user identification confidence is reached. This can potentially reduce the amount of interaction needed as compared to requiring a user to type in a long, cryptic password.
Abstract:
The disclosed embodiments provide a convenient way for users to access segregated work spaces on mobile devices. A game-like multi-level interactive approach is used to prompt users for input to verify their identity. Multiple identity verification attributes can be collected at each level of interaction. Authentication is achieved when a settable level of user identification confidence is reached. This can potentially reduce the amount of interaction needed as compared to requiring a user to type in a long, cryptic password.
Abstract:
A system and method for managing user data preferences across multiple online sites and applications. A privacy center can be configured to include a user interface and an application programming interface (API). The user interface can be employed to set preferences for specific data types in order to handle the data types with a different level of privacy than other similar data type by the user. The API permits a plurality of sites to discover user's preferences, field names, and categories of data recognized by the site. The API adds new data fields to accommodate future changes in both technology and in legal restrictions on data usage. An address with respect to the API and the user interface along with a token can be entered when installing an application and the application downloads the preferences and applies them based on requirement.
Abstract:
In a mobile communication device having segregated workspaces respectively associated with a plurality of users, methods and systems are provided for confirming an authorized user in an appropriate account including a corresponding one of the segregated workspaces. Start-up processing of the device includes taking a picture of an authorized image of the authorized user with the device camera. Current activities of the device by the user are monitored relative to a predetermined set of device activities and usage rules. Certain activities are indicative of a change in user of the device from the authorized user. Upon detection of such a change, the current image of the current user of the device is acquired with the device camera. The current image is compared with the authorized image and if the comparison fails to detect a match, the current user is prompted to initiate a log-in process.
Abstract:
A system and method for managing user data preferences across multiple online sites and applications. A privacy center can be configured to include a user interface and an application programming interface (API). The user interface can be employed to set preferences for specific data types in order to handle the data types with a different level of privacy than other similar data type by the user. The API permits a plurality of sites to discover user's preferences, field names, and categories of data recognized by the site. The API adds new data fields to accommodate future changes in both technology and in legal restrictions on data usage. An address with respect to the API and the user interface along with a token can be entered when installing an application and the application downloads the preferences and applies them based on requirement.