Patent application number | Description | Published |
20090129591 | Techniques for Securing Document Content in Print and Electronic Form - A technique for securing selected document content includes receiving, at a printer, an unsecured electronic document. Selected content of the electronic document is then encrypted, with an encryption key, at the printer. A paper document whose content includes the encrypted selected content of the electronic document is then printed. The encrypted selected content of the paper document is unintelligible prior to decryption with a decryption key. | 05-21-2009 |
20090132457 | DATA COMPARISON USING DIFFERENT TIME PERIODS IN DATA SEQUENCES - Data for a first time period in a primary data sequence is compared with data for a second time period in each of a set of secondary data sequences. The durations of the first and second time periods are correlated, and the first time period is different from the second time period. To this extent, the data in the primary data sequence during the first time period provides a template for assigning a ranking to each secondary data sequence based on the corresponding data for the second time period. | 05-21-2009 |
20110071811 | USING EVENT CORRELATION AND SIMULATION IN AUTHORIZATION DECISIONS - Performance impacting operations (e.g., maintenance operations) performed on a system can, depending on a current state of the system, heavily impact the performance of the system, thus affecting a customer's experience with the system. Functionality can be implemented to control execution of the performance impacting operations based on simulating the impact of executing the operation. Depending on the current state of the system, execution of the maintenance operations can be allowed, deferred, and even blocked. This can ensure that the performance of the system is not compromised. | 03-24-2011 |
20120157157 | Sharing Contact Information - A method for exchanging contact information includes, with a mobile computing device, establishing communication with a peer mobile computing device within a specified distance from the mobile computing device, determining if the peer mobile computing device meets a trust policy, automatically receiving contact information from the peer mobile computing device, and storing the contact information in a temporary contact list. A mobile computing system includes a processor and a memory communicatively coupled to the processor. The processor is configured to establish communication with a peer mobile computing device within a specified distance from the mobile computing device, determine if the peer mobile computing device meets a trust policy, receive contact information from the peer mobile computing device, and place the contact information in a temporary contact list stored on the memory. | 06-21-2012 |
20140325612 | USING SOCIAL NETWORKING THRESHOLDS IN ACCESS CONTROL DECISIONS - A method, program product and apparatus for controlling access to profile information, multi-media resources or social network functions of a first user by a second user not listed on a friend or group listing of the first user. An application retrieves a threshold criteria for access control and social network statistics in response to an attempted access by an entity without an appropriate privilege. The application compares the statistics to the threshold. Then, if the statistics meet the threshold criteria, the application allows access. | 10-30-2014 |
20150347391 | PERSONA MANAGEMENT SYSTEM FOR COMMUNICATIONS - A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine. The communication analyzer receives an element of original content of a written communication. The communication analyzer also receives a selection of a persona style. The selected persona style defines a communication style. The modification engine presents a substitute element to a user in response to a determination that the element of the original content of the written communication is incompatible with the selected persona style. The substitute element is compatible with the selected persona style. | 12-03-2015 |
20160048787 | WORK PLAN BASED CONTROL OF PHYSICAL AND VIRTUAL ACCESS - A method, system, and computer program product for work plan based access control are provided in the illustrative embodiments. For a portion of the work plan, a physical space is determined. Access to the physical space is used in a task in the portion. At least one workflow is initiated to determine whether to grant the access to the physical space. Responsive to the workflow granting the access to the physical space, the access to the physical space is configured for a first duration for a first user performing the task. Responsive to an indication of closing of the portion, the access to the physical space for the first duration for the first user performing the task is revoked. | 02-18-2016 |