Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

275 results about "Object definition" patented technology

System for sorting document images by shape comparisons among corresponding layout components

A programming interface of document search system enables a user to dynamically specifying features of documents recorded in a corpus of documents. The programming interface provides category and format flexibility for defining different genre of documents. The document search system initially segments document images into one or more layout objects. Each layout object identifies a structural element in a document such as text blocks, graphics, or halftones. Subsequently, the document search system computes a set of attributes for each of the identified layout objects. The set of attributes are used to describe the layout structure of a page image of a document in terms of the spatial relations that layout objects have to frames of reference that are defined by other layout objects. Using the set of attributes a user defines features of a document with the programming interface. After receiving a feature or attribute and a set of document images selected by a user, the system forms a set of image segments by identifying those layout objects in the set of document images that make up the selected feature or attribute. The system then sorts the set of image segments into meaningful groupings of objects which have similarities and / or recurring patterns. In operation, the system sorts images in the image domain based on segments (or portions) of a document image which have been automatically extracted by the system. As a result, searching becomes more efficient because it is performed on limited portions of a document. Subsequently, document images in the set of document images are order and displayed to a user in accordance with the meaningful groupings.
Owner:XEROX CORP

Factor analysis of information risk

InactiveUS20050066195A1Risk management decisions can become more effective and efficientGood return on investmentDigital data processing detailsComputer security arrangementsSalient objectsObject definition
The invention is a method of measuring and representing security risk. The method comprises selecting at least one object within an environment and quantifying the strength of controls of at least one object within that environment. This is done by quantifying authentication controls, quantifying authorization controls, and then quantifying structural integrity. In the preferred method, the next step is setting global variables for the environment, for example, whether the environment is subject to regulatory laws, and then selecting at least one threat community, for example, professional hackers, and then calculating information risk. This calculation is accomplished by performing a statistical analysis using the strengths of controls of said at least one object, the characteristics of at least one threat community, and the global variables of the environment, to compute a value representing information risk. The method identifies the salient objects within a risk environment, defines their characteristics and how they interact with one another, utilizing a means of measuring the characteristics, and a statistically sound mathematical calculation to emulate these interactions and then derives probabilities. The method then represents the security risk, such as the risk to information security, such as by an integer, a distribution or some other means.
Owner:JONES JACK A

Integration of three dimensional scene hierarchy into two dimensional compositing system

A hierarchy of 2D visual objects and 3D scene objects are integrated for seamless processing to render 2D images including a 2D view of a 3D scene on a 2D computer display. The processing of the 3D model objects and 2D visual objects in the visual hierarchy is integrated so that the processing is readily handed off between 3D and 2D operations. Further the number of transitions between processing visual 2D objects and 3D model objects when creating a display image has no architectural limit. A data structure integrates computer program objects for creating 3D images and 2D images in a visual tree object hierarchy having visual 2D objects or 3D scene objects pointing to 3D model objects. The data structure comprises an object tree hierarchy, one or more visual 2D objects, and one or more 3D reference or scene objects pointing to 3D model objects. The visual 2D objects define operations drawing a 2D image. The 3D reference or scene objects define references pointing to objects with operations that together draw a two-dimensional view of a three-dimensional scene made up of one or more 3D models. The 3D reference or scene objects point to 3D model objects and a camera object. The camera object defines a two-dimensional view of the 3D scene. The 3D model objects draw the 3D models and define mesh information used in drawing contours of a model and material information used in drawing surface texture of a model. The material information for the surface texture of a model may be defined by a visual 2D object, a 3D reference or scene object or a tree hierarchy of visual 2D objects and / or 3D reference scene objects.
Owner:MICROSOFT TECH LICENSING LLC

System and method for presentation of wireless application data using repetitive UI layouts

InactiveUS20050193361A1Reduced executable codeDegree of flexibility and efficiencyProgram loading/initiatingExecution for user interfacesObject definitionData field
A Repetitive Layout scheme is provided that operates on a collection of data objects, such that each data object accords to the same data object definition (data model) expressed in a structured definition language. The Repetitive Layout consists of one UI section repeated for every object in the collection. Each UI section is composed of a set of UI controls or sub-layouts. The UI controls in each section are associated with the data fields of the corresponding data object. A user of a wireless application interacting with the data objects can select UI sections and edit the controls within them via the user interface of the wireless device executing the application. Any modifications are propagated to the data objects mapped to the respective UI sections. Similarly, all modifications (driven by the application logic or incoming server messages) to the data objects are reflected in the UI section mapped to these objects. The generation and application of the repetitive layout scheme can include the steps: dynamic data entity generation (Data Composer stage); determining the collection of data objects that need to be presented by the user interface (Rules Engine stage); sorting the collection of data objects (Sorting Processor stage); generating the UI Layout (Layout Generator stage); propagating UI changes back to the Data Model having the definitions of the data objects (Data Dispatcher stage); propagating data changes to the Repetitive Layout; and propagating changes to nodes of the data model.
Owner:BLACKBERRY LTD

Dynamic data leakage prevention system and method

The invention discloses a dynamic data leakage prevention system and method. The method comprises a data filtering rule file storage module, a data management control policy storage module and a file scanning engine, wherein the data filtering rule file storage module is used for storing a data filtering file, and the data filtering rule file comprises a plurality of different types of data filtering rules; the data management control policy storage module is used for storing a data management control policy, and the data management control policy comprises corresponding relationships between the different types of data filtering rules and different levels of data management control schemes; and the file scanning engine loads the data filtering rule file and the data management control policy, scans data sent to outside according to the data filtering rule file when the data needs to be sent to the outside, and performs corresponding outside sending control on the data sent to the outside. According to the system and the method, data leakage prevention can be dynamically performed, a leakage prevention management control object is defined in data, and a terminal or a user is no longer taken as a subject, so that the flexibility and security of data security control are improved.
Owner:北京明朝万达科技股份有限公司

Method for controlling access to informational objects

The described embodiments of invention comprises a method and an apparatus for regulating access to objects by authorized entities. Authorized entities are entities authorized for access by either an owner entity of the regulated object or an entity authorized to authorize access to the regulated object. Each user, which may be a physical person or another information system, is identified using standard user validation techniques. When an object is first created or introduced to the system, that information is associated with an owner, who is one user on the system. The present embodiment allows the owner to define relationships with other users, either generally or regarding a particular object. The owner may or may not have trusted relationships with other users. A second user that has a trusted relationship with the owner automatically has access to the object without additional intervention by the owner. In addition, the second user may have a trusted relationship with another user. In the above example, the records administrator may have an assistant. This third user will also have access to the records. This Web of Trust may link users infinitely, but such a case would create an undue risk of compromise of the information. Thus, the present embodiment includes a facility for the owner to designate a maximum number of trusted links from the owner and other users.
Owner:OPTIMIZATION ZORN CORP DBA OZ SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products