G06F2221/2147

Integration of pictorial content into secure signature documents

A system and a method are disclosed for enabling pictorial content to be added to a secure document. In an embodiment, a secure document tool receives a request, from an administrator of the secure document, to enable modification of a region of the secure document with an addition of pictorial content, the secure document configured to prevent modification of contents of the secure document by a signer, the secure document enabled to accept a signature on the secure document by the signer. The secure document tool receives, from the signer, a command to add pictorial content to the region, and responsively adds the pictorial content to the region. The secure document tool receives from the signer, a signature on the secure document, and responsively disables the secure document from accepting further modifications.

System and method for light data file duplication prevention

A system for preventing duplication of a computer source file to a destination file includes a user application accessed by a user of a computer. An agent application hosted by the computer registers for a notification of a user interface action with an operating system (OS) of the computer. The agent receives notice from the OS of the user interface action and determines if the user interface action is indicative of a data file duplication operation of a source file to a destination file location The Agent compares a property of the source file and a property of the destination file location to a blocking criteria, and blocks the user interface action from reaching the application.

Method and apparatus for user protection from external e-mail attack
11750647 · 2023-09-05 · ·

A method and apparatus are described for user protection from external e-mail attack. Some embodiments pertain to receiving a first e-mail at an e-mail client, receiving a detection of a suspicious element in the first e-mail from a detection system, flagging the first e-mail as suspicious with a first flag and a first warning level in response to receiving the detection, flagging a second e-mail with a second flag and a second warning level, displaying the first and second flags with explanatory text in a mailbox view of the e-mail client without opening the first and second e-mail for display to the user, the suspicious element not being selectable in the mailbox view, and sorting the first and the second e-mail with other e-mails of the mailbox view based on the flag warning levels.

BLOCKCHAIN-IMPLEMENTED CONTROL METHOD AND SYSTEM FOR CONTROLLING AN EXTERNAL PROCESS OR SYSTEM
20230144153 · 2023-05-11 ·

A computer-implemented method for controlling an external process or system and allowing a modification of blockchain transaction outputs, the method comprising one or more steps to generate a blockchain transaction comprising at least one signed input which comprises a value and at least one modifiable output, extract one or more values from one or more signed inputs associated with one or more combination locks, provide one of the values to a portion of logic to obtain a result, and use the result to modify at least one modifiable output of the transaction, wherein the transaction represents the result, wherein the values are extracted external from the blockchain transaction, and wherein the transaction are submitted to the blockchain.

FILE LIFETIME TRACKING FOR CLOUD-BASED OBJECT STORES
20230139297 · 2023-05-04 ·

Tracking changes to a document by defining a document record having a unique document record and comprising an index and a file name of the document, and defining a backup record for the document in a series of backups, which includes a timestamp for each backup, and a bitmask for the document. The bitmask has a single bit position for each document in the container which is set to a first binary value to indicate that the corresponding document is unchanged and a second binary value to indicate whether the document is changed or deleted. A primary query is received and resolved for the document by analyzing the document record to find the file name. A secondary query using the document record ID is resolved to find all tracked versions of the document, and the results are returned to the user in the form of a version history list.

SYSTEM AND METHOD FOR DOCUMENT BRANCHING

Disclosed are systems and methods for document branching. In some embodiments, the method includes the steps of: obtaining a branch model associated with a set of related documents, the branch model comprising one or more branches, each branch of the one or more branches comprising a branch type and one or more nodes, the one or more branches comprising a primary branch associated with a primary document, the set of related documents comprising the primary document having a first document identifier; generating a secondary branch based upon a revision of the primary document, the secondary branch associated with a secondary document of the set of related documents, the secondary document having a second document identifier; and adding the secondary branch to the branch model.

REFERENCING A DOCUMENT IN A VIRTUAL SPACE

In association with a communication platform, one or more users can create, share, edit, and/or comment on a document. Some examples of this disclosure are related to providing a list of suggested documents that a user can reference (e.g., add a link to) in a virtual space (e.g., in a message or post to one or more other users). For example, a user can be interacting with a virtual space (e.g., composing a direct message, a channel post, a thread, a workspace, a document, and the like) and invoke a list of suggested documents that can be referenced in the virtual space. In examples of the present disclosure, the list of suggested documents can include documents that are identified (e.g., based on one or more conditions being met) to be relevant to, or otherwise associated with, the virtual space.

File lifetime tracking for cloud-based object stores

Tracking changes to a document by defining a document record having a unique document record and comprising an index and a file name of the document, and defining a backup record for the document in a series of backups, which includes a timestamp for each backup, and a bitmask for the document. The bitmask has a single bit position for each document in the container which is set to a first binary value to indicate that the corresponding document is unchanged and a second binary value to indicate whether the document is changed or deleted. A primary query is received and resolved for the document by analyzing the document record to find the file name. A secondary query using the document record ID is resolved to find all tracked versions of the document, and the results are returned to the user in the form of a version history list.

METHOD AND APPARATUS FOR PROTECTING COMPUTERS
20230385436 · 2023-11-30 ·

Computer protection is weak with the methods currently available and there are risks of malicious users getting access to computers, corrupting important data, including system data. We are proposing a method for improving access protection, more particularly, by using a slave device that will enable or disable protection for applications as required. The device supports one or more users, none or more user groups, none or one or more Application Security Environments for each user or user group and one or more states for each Application Security Environment. The state of the hardware is manually controlled by the users. Depending on the configuration, each hardware state corresponding to an Application Security Environment corresponds to a set of privileges the processes running in that Application Security Environment have while that Application Security Environment is in that state.

Blockchain-implemented control method and system for controlling an external process or system
11463260 · 2022-10-04 · ·

The invention provides a computer-implemented method and corresponding system which is implemented using an electronic ledger such as a blockchain. This may or may not be the Bitcoin blockchain. The invention can be used to implement, execute and/or control the performance of a task or process. A method according to the invention comprises the steps of generating a blockchain Transaction which comprises: at least one signed input which comprises a value; and at least one modifiable output. It further comprises the step of extracting the value from the signed input and providing it to a portion of logic to obtain a result; and using the result to modify the output of the Transaction. The transaction provides a record and/or representation of the execution of the portion of logic and/or the result. The signed input is provided to the Transaction using an unlocking script. The at least one input is signed using a signature hash type which renders the input as non-modifiable. This may be the signature hash type SIGHASH_NONE. The Transaction may further comprise at least one unsigned input. The unsigned input may be signed after the output has been modified. The unsigned input can be signed using a signature hash type which prevents modification of the whole Transaction, and may be the signature hash type is SIGHASH_ALL. Further the value can be embedded in a public key associated with the signed input; and extracted from the public key so as to provide it to the portion of logic. The portion of logic can be arranged to implement the functionality of a logic gate or combination of gates, such as an AND, NOT, OR, NOR, XOR, IMPLY, NAND, NONIMPLY or XNOR gate. Thus, the invention provides a highly versatile and useful technical approach for implementing tasks using a blockchain.