System and method of governing content presentation of multi-page electronic documents

    公开(公告)号:US11829452B2

    公开(公告)日:2023-11-28

    申请号:US17373432

    申请日:2021-07-12

    申请人: Leonard L. Drey

    发明人: Leonard L. Drey

    摘要: A method of governing content presentation of multi-page electronic documents includes providing, to a publisher, a document file, which includes a program file, and a text file functionally associated with the program file. The publisher provides the text file to an author, who creates a version of a work of content based on the text file that is parsed into defined units of content. The author provides the units of content of the current version of the work of content to a user, to be viewed by the user on a display device in a sequence determined by the author. Creating the at least one version of the work of content includes enabling a primary secondary action key such that actuation, by the user, of the primary secondary action key advances a reading frame viewable by the user by a number of strings between main pages, plus one.

    Systems and methods to facilitate authorization key obfuscation validation

    公开(公告)号:US12086218B2

    公开(公告)日:2024-09-10

    申请号:US17555158

    申请日:2021-12-17

    申请人: BlueOwl, LLC

    发明人: Marco Ancheta

    IPC分类号: G06F21/14 H04L9/08 G06F21/10

    摘要: A device for validating authorization key obfuscation in a continuous integration (CI) pipeline codebase is presented. The device includes a transceiver, one or more memories, and one or more processors interfacing with the transceiver and the one or more memories. The one or more processors are configured to receive an update to the CI pipeline codebase. The update may include an authorization key, which the one or more processors store in the one or more memories. The one or more processors may perform a build process to integrate the update into the CI pipeline codebase. The build process may include an obfuscation, which creates an obfuscated CI pipeline codebase. The one or more processors may also scan the obfuscated CI pipeline codebase to determine a presence or an absence of the authorization key.