Abstract:
A composite document comprises a publicly posted composite document including a plurality of parts, a map-file for each participant in a workflow associated with the composite document, and a set of encryption keys. The encryption keys are associated with at least one of the plurality of parts and distributed via the map file to the participants. At least one of the parts of the composite document, associated with the encryption keys, includes workflow processing instructions. The workflow processing instructions are enactable by the multifunction printer independent of a server and automate at east some steps of the workflow for participant at the multifunction printer via resident functions of the multifunction printer.
Abstract:
A method tor regulating production of an object, the method comprising allocating access rights and a production quota to a user, the production quota to be fulfilled on an authorised production device using an encrypted unique job token embedded or comprised within or derived from the object and associated with the user and production device, receiving a user request to produce the object at the authorised production device, authenticating the user, decrypting the encrypted unique job token using a private key of the user and a private key of the production device, determining whether the production quota for the user related to the object has been met and on the basis of the determination, authorising the user request to produce the object at the authorised production device.
Abstract:
Examples disclosed herein relate to a content delivery network including a first and second mobile device. In one implementation, a peer to peer connection is established between a first and second mobile device to create a content delivery network. At least one of the mobile devices in the content delivery network may store content. In response to a request to render content, at least one of the mobile devices in the content delivery network may transmit the content to cause a content delivery device to render the content.
Abstract:
A method for regulating document access, the method comprising providing a set of access keys for a user, respective ones of the keys providing different user access privileges for components of a composite document, selecting multiple nodes in a distributed storage system, distributing data representing N fragments of encrypted or unencrypted versions of the set of access keys and/or at least one of the individual keys and/or a symmetric key. K, associated with the user across N selected nodes of the distributed storage system, wherein the encrypted versions are encrypted using the symmetric encryption key. K, associated with the user, encrypting data relating to address information of the N selected nodes using a public encryption key of the user to generate a location object and storing the location object as a component of the composite document.
Abstract:
A controller for a fulfilment service operation is described in which the controller, before initiating fulfilment of the job, operates to determine if an authorised user is present at a fulfilment service device and to determine if the user intends to remain attendant at the fulfilment service device for the duration of fulfilment of the job. If the user moves away from the fulfilment service device, the controller operates to pause the job. If the user remains away from the fulfilment service device for a period of time, the controller operates to cancel the job.
Abstract:
In one example in accordance with the present disclosure, a computing device is described. The computing device includes an encryption device to encrypt, using an encryption key, a document to be rendered. A generating device generates multiple shares of a decryption key using a secret-sharing scheme. A threshold number of the multiple shares allows decryption of the document. A transmit device transmits different shares of the multiple shares to different devices. The document is rendered when the threshold number of multiple shares are rejoined at a rendering device.
Abstract:
Aspects of the present disclosure relate to a method of performing a pull printing operation. In one example, the method comprises receiving at a source printer, from a client device, data defining a print job, wherein the source printer comprises a node of a decentralized distributed network of printers. The method then comprises storing the data in a plurality of printers, wherein the plurality of printers comprise nodes of the distributed network. The data is retrievable by a destination printer, wherein the destination printer comprises a node of the distributed network, to print the print job.
Abstract:
A method tor regulating production of an object, the method comprising allocating access rights and a production quota to a user, the production quota to be fulfilled on an authorised production device using an encrypted unique job token embedded or comprised within or derived from the object and associated with the user and production device, receiving a user request to produce the object at the authorised production device, authenticating the user, decrypting the encrypted unique job token using a private key of the user and a private key of the production device, determining whether the production quota for the user related to the object has been met and on the basis of the determination, authorising the user request to produce the object at the authorised production device.
Abstract:
A method for regulating document access, the method comprising providing a set of access keys for a user, respective ones of the keys providing different user access privileges for components of a composite document, selecting multiple nodes in a distributed storage system, distributing data representing N fragments of encrypted or unencrypted versions of the set of access keys and/or at least one of the individual keys and/or a symmetric key. K, associated with the user across N selected nodes of the distributed storage system, wherein the encrypted versions are encrypted using the symmetric encryption key. K, associated with the user, encrypting data relating to address information of the N selected nodes using a public encryption key of the user to generate a location object and storing the location object as a component of the composite document.
Abstract:
Aspects of the present disclosure relate to a method of performing a pull printing operation. In one example, the method comprises receiving at a source printer, from a client device, data defining a print job, wherein the source printer comprises a node of a decentralized distributed network of printers. The method then comprises storing the data in a plurality of printers, wherein the plurality of printers comprise nodes of the distributed network. The data is retrievable by a destination printer, wherein the destination printer comprises a node of the distributed network, to print the print job.