Patent application number | Description | Published |
20090144520 | METHOD AND APPARATUS FOR SELECTING A DATA ITEM - A method of selecting a data item from a memory within a first device, the method comprising the steps of evaluating within the first device a function of an input argument so as to form an output value, using the output value to select a data item from the memory and transmitting the selected data item to a second device. | 06-04-2009 |
20100052308 | ANTI-COUNTERFEIT PACKAGING - Anti-counterfeit marking for a product, comprising: a tamper evident marker attached to or integrated with a product or packaging for a product and having a random mark; and an electronic memory element containing data about the random mark, the memory element being attached to or integrated with the product or packaging for the product in a tamper evident manner. | 03-04-2010 |
20100199168 | Document Generation Method and System - A method executed by a computer of generating a repurposed document comprising providing a representation of a first document with no explicitly defined structure, extracting structural information for the first document using a set of predefined rules, determining a first content item formatted using a first style of the first document using the structural information, applying a second style to the first content item in order to generate a second content item, and generating the repurposed document using the second content item, wherein a visually perceived significance is maintained between said first and second items, and a programmed computer operable to perform the same. | 08-05-2010 |
20100281065 | METHOD FOR ADDING A DATA ITEM TO A COMPOSITION OF DATA ITEMS - A method for adding a data item to a composition of data items, the composition of data items including at least two data items which are partially adjacent with respect to one another, the composition defining at least one composite corner, wherein a vertex of a data item is a free vertex if it does not lie substantially on, against or within a boundary of another data item, the composition defining by a first convex polygon determined by joining all contiguous free vertices of the at least two data items using straight line segments, the method including selecting a candidate data item from a set of data items; selecting a candidate position in the composition, a candidate position being substantially on or against a composite corner, or within a boundary of another data item adjacent to a composite corner; placing the selected data item at the candidate position to create a further composition; and accepting the placement of the selected data item if the further composition defines a further convex polygon. | 11-04-2010 |
20110029482 | SYNCHRONIZING A CHANGE OF A MODULAR DOCUMENT - A first electronic device stores a modular document composed of plural component documents that are combined to allow presentation of the modular document. A surrogate of the modular document is sent to a second electronic device. A change of the surrogate made at the second electronic device is synchronized with the modular document, or a change of the modular document is synchronized with the surrogate at the second electronic device. | 02-03-2011 |
20110029851 | SENDING A SUBSET OF COMPONENT DOCUMENTS OF A MODULAR DOCUMENT TO AN ELECTRONIC DEVICE - To communicate a modular document from a first electronic device to a second electronic device, the first electronic device determines which one or more component documents of the modular document are already available at the second electronic device. The modular document is composed of plural component documents. The first electronic device sends to the second electronic device a subset of the plural component documents of the modular document, where the subset of the plural component documents is other than the one or more component documents already available at the second electronic device. | 02-03-2011 |
20110035661 | DOCUMENT LAYOUT SYSTEM - A method for generating a document, comprising providing a set of content items in a first configuration for the document, using a processor, generating alignment data representing a measure for the alignment of the content items in the first configuration, using the alignment data to determine if the content items are aligned with one another within a predefined threshold measure for alignment for the document, and a document layout system comprising a processing module configured to generate a document layout. | 02-10-2011 |
20110035811 | PROVIDING AN ACCESS MECHANISM ASSOCIATED WITH A DOCUMENT PART TO DETERMINE AN ACTION TO TAKE IF CONTENT OF THE DOCUMENT PART IS INACCESSIBLE - A modular document is composed of plural parts, where at least a particular one of the parts is associated with an access right policy that restricts access to the particular part. In response to a request to access the modular document, it is determined based on the access right policy whether content of the particular part is accessible in an electronic device. In response to determining that the content of the particular part is inaccessible in the electronic device, an access mechanism associated with the particular part is accessed to determine an action to take with respect to the particular part when presenting the modular document. | 02-10-2011 |
20110078165 | DOCUMENT-FRAGMENT TRANSCLUSION - A transclusion method provides for transclude copying a source fragment of a source document into a target document. As a result, the target document contains a target fragment. The target fragment is a copy of the source fragment. A reference to the source document is included with the target fragment in the target document. The reference identifies a location for the source document and provides search data for locating the source fragment within the source document. | 03-31-2011 |
20120022919 | Privacy Ensured Polling - A method for conducting a privacy ensured computerized poll includes, in a computerized anonymizing system ( | 01-26-2012 |
20120109977 | KEYWORD DETERMINATION BASED ON A WEIGHT OF MEANINGFULNESS - Example embodiments relate to keyword determination based on a weight of meaningfulness. In example embodiments, a computing device may determine a number of occurrences of a word in a particular document and may then determine a weight of meaningfulness for the word based on the number of occurrences. The computing device may then add the word to a set of keywords for the document based on the weight of meaningfulness. | 05-03-2012 |
20130031366 | MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD FOLLOWING INTRODUCTION OF THE PPCD INTO A WORKFLOW - In a method for managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow among a plurality of workflow participants, in a secure content manager, from a workflow participant of the plurality of workflow participants, a key-map file for a subsequent workflow participant that is to receive the key-map file is received, wherein the key-map file comprises a set of keys to enable the subsequent workflow participant to access the content-part in the PPCD. In addition, authenticity of the received key-map file is verified, the subsequent workflow participant to receive the PPCD is identified and authenticated, a public key of the subsequent workflow participant is accessed, the key map file or a symmetric key used to encrypt the key-map file prior to receipt of the key-map file by the secure content manager is encrypted using the public key of the subsequent workflow participant, and the encrypted key-map file is sent to the subsequent workflow participant. | 01-31-2013 |
20130031369 | MANAGING ACCESS TO A SECURE CONTENT-PART OF A PPCD USING A KEY RESET POINT - In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map files comprising subsets of access keys that provide access to the secure content-part during respective content access sessions are generated, in which at least one of the key-map files corresponds to the key reset point and comprises a first decryption key, a first verification key, a second encryption key, and a second signature key, in which the first decryption key does not correspond to the second encryption key, and in which the first verification key does not correspond to the second signature key. In addition, the plurality of key-map files are supplied to at least one of the participants. | 01-31-2013 |
20130104190 | SYSTEM AND METHOD FOR DOCUMENT POLICY ENFORCEMENT - A system and method is disclosed for document policy enforcement. The method discloses: scanning document parts for a set of policy-eliciting terms | 04-25-2013 |
20130111544 | MANAGEMENT OF CONTEXT-AWARE POLICIES | 05-02-2013 |
20130124567 | AUTOMATIC PRIORITIZATION OF POLICIES - Input is obtained to modify one of a set of self-consistent and prioritized document policies, each policy indicating an allowability of a requested action when a condition of the policy is satisfied. Each policy is representable by a node on a multipartite graph, the node being located in a part of the multipartite graph that corresponds to the allowability indicated by the policy. Two nodes are connectable by an edge that indicates a relative priority between their corresponding policies. A transitive closure of the representation is computed so as to identify paths of contiguous edges that connect pairs of nodes. When two policies with different allowabilities are applicable to a single requested action on a single document, and when the corresponding nodes are connected by one of the identified paths, a relative priority is automatically assigned to the two policies as indicated by the path. | 05-16-2013 |
20130174216 | Application of Differential Policies to at Least One Digital Document - In a method ( | 07-04-2013 |
20140165137 | Data Leak Prevention Systems and Methods - A data leak prevention system includes an application, having source code that is unavailable or non-modifiable, resident on a client device. A system call is emittable by the application as a result of an action, and is to take place before a data leak event can occur. The action involves a document and i) latest full contents of the document, ii) metadata of the document, or iii) a combination of the latest full contents and the metadata. A system call interceptor agent is also resident on the client device. The interceptor agent includes a system call interceptor to intercept the system call emitted by the application and to suspend the system call. The system also includes a policy decision engine to analyze at least some of i) the latest full contents, ii) the metadata, or iii) the combination, and implement a policy action based upon the analysis. | 06-12-2014 |
20140339312 | Progressive Barcode - A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of blocks in a progressive barcode. The method and apparatus including, encoding information of a first data element within the matrix using black modules and, encoding information of a second data element within the matrix using color modules. The barcode being configured to be overprinted as it progresses through progressive states. The progressive barcode, resulting from the overprinting through the progressive states, masking the ability to conclusively determine the barcode in a previous state. | 11-20-2014 |