Abstract:
A method, system and computer program product for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest.
Abstract:
PROBLEM TO BE SOLVED: To provide an improved solution for offering contents through a network. SOLUTION: By this method, concretely, a tag indicating data which must be inserted and whose reading-in is slow is inserted into an indicating content. When the indicating content is requested, a placeholder is inserted to the indicating content instead of the tag and the indicating content is offered for indicating at a client. Next, the data whose reading-in is slow is obtained and is inserted to the indicating content, and then this is offered for indicating at the client. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method, a system, a computer program and a business method for securing or controlling document components using a "security container" wherein the document components (and other component metadata) are encapsulated. SOLUTION: The "security container" encapsulates the components (namely a document) to be controlled within a high level construction such as a compound document. The security container also contains a rule for interacting with the encapsulated component and one or a plurality of encryption keys usable for decrypting the component and the rule for authorized requesters. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method for efficient processing of the buffering, syntax analysis, routing, and extraction of data of the documents when XML documents flow in the network by CBR(content based routing) device for instance. SOLUTION: A method for efficient processing of XML documents in content based routing(CBR) networks involves converting existing XML documents to a machine-oriented notation (mXML) which is significantly more compact than XML, while still conveying the content and semantics of the data and the structure of the document. Documents are converted from XML to mXML upon entering a CBR sub network and/or upon receipt by an mXML-capable device. The documents are then processed in mXML format. Documents being routed to a target which is mXML-capable are passed in mXML format while documents being routed to a target which is not mXML-capable are converted to XML before they are passed.
Abstract:
PROBLEM TO BE SOLVED: To provide a method, an apparatus, a system and a computer program product for using RFID techniques for storing product information on a tag attached to a commodity. SOLUTION: The method includes (a) writing a value into a first memory 560 which forms a portion of an RFID tag and which has a length; (b) writing a form in the second memory 550 of the RFID tag: and (c) imposing access control rules on the first memory 560 in response to (a) and (b). This can prevent alteration of the stored information, tracking of customers and purchased merchandise on a global scale, and the discrepancy of prices which occurs at points of sale.
Abstract:
Documents are subject to selective encoding for protecting the information against unintentional publication, and include XML-documents and XSL-processors, and following preparation of an input-document, one or several support objects are prepared, and then a document-type definition (DTD) corresponding to the given input document. Selected prescribed support objects are carried out during use of one or more style-sheets on the given input document, resulting in an interim document. One or several randomly generated encoding keys are then generated, and the selected elements of the interim documents are encoded, to prepared producing an encoded output document with zero or more unencoded elements. The find (result) documents is produced on a given client device, with encoding of the given received documents for a discrete user or process on the stated client device.
Abstract:
A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or "XSL", processor) that creates a selectively-encrypted document (e.g. an Extensible Markup Language, or "XML", document) carrying key-distribution material, such that by using an augmented document processor (e.g. an augmented XML processing engine), an agent can recover only the information elements for which it is authorized. The Document Type Definition (DTD) or schema associated with a document is modified, such that the DTD or schema specifies a reference to stored security policy to be applied to document elements. Each document element may specify a different security policy, such that the different elements of a single document can be encrypted differently (and, some elements may remain unencrypted). The key distribution material enables a document to be encrypted for decryption by an audience that is unknown at the time of document creation, and enables access to the distinct elements of a single encrypted document to be controlled for multiple users and/or groups of users. In this manner, group collaboration is improved by giving more people easier access to information for which they are authorized, while protecting sensitive data from unauthorized agents. A key recovery technique is also defined, whereby the entire document can be decrypted by an authorized agent regardless of how the different elements were originally encrypted and the access protections which were applied to those elements.
Abstract:
A method, system, and computer program product for using Java Server Pages t o enable transcoding the content of a document requested by a client, in order to tailor the output document according to application-specific characteristics. In particular, the presen t invention enables the JSP author to override input source request characteristics and to specify transcoding hints to be used by a transcoding filter for selecting an appropriate style sheet.
Abstract:
A device certificate identifies a particular device using a globally-unique device identifier and contains a public key associated therewith. A private key stored in protected storage of the device is used to digitally sign outbound messages, enabling communicating devices to authenticate one another using the associated device certificate and public key, before returning a response. Devices functioning as servers can thereby securely participate in dynamic, automatic address assignment services using a service such as a Boot Protocol or Dynamic Host Configuration Protocol, and/or to update address information stored in a Domain Name System (DNS) server, ensuring that the update is authentic, and when the DNS is also authenticated, ensuring that a legitimate DNS has been contacted.
Abstract:
Verfahren zum Verbessern des Austauschens von Daten in einer Social-Network-Umgebung, das Verfahren aufweisend: Erkennen (302) von auf eine e-Mail, eine Statusaktualisierung und/oder einen Kommentar angewendeten Kopieren und/oder Hervorheben; Erkennen (303) des Eintragens der e-Mail und/oder der Statusaktualisierung und/oder des Kommentars auf einer Social-Networking-Webseite; Ermitteln (304) eines Zusammenhangs zwischen der Social-Networking-Webseite und der e-Mail und/oder der Statusaktualisierung und/oder dem Kommentar; Ermitteln (305) eines oder mehrerer Regelmuster beruhend auf dem erkannten Kopieren und/oder Hervorheben, dem erkannten Eintragen der e-Mail und/oder der Statusaktualisierung und/oder des Kommentars auf der Social-Networking-Webseite und dem ermittelten Zusammenhang zwischen der Networking-Website und der e-Mail und/oder der Statusaktualisierung und/oder dem Kommentar; Speichern (306) einer Angabe des Zusammenhangs zwischen der Social-Networking-Webseite und der e-Mail und/oder der Statusaktualisierung und/oder dem Kommentar in Form von Konzeptknoten in einem hierarchischen Baum unter Verwendung des/der ermittelten einen oder mehreren Regelmuster(s); und Suchen nach jeglichen Social-Networking-Feeds von Interesse unter Verwendung des hierarchischen Baums sowie einer aktuellen e-Mail, einer aktuellen Statusaktualisierung und/oder eines aktuellen Kommentars eines Benutzers durch einen Prozessor.