摘要:
Embodiments of proxy authentication and indirect certificate chaining are described herein. In an implementation, authentication for a client occurs via a proxy service. Proxy service communicates between client and server, and caches security tokens on behalf of the client. In an implementation, trustworthiness of certificate presented to a client to establish trust is determined utilizing a signed data package which incorporates a plurality of known certificates. The presented certificate is verified without utilizing root certificates installed on the client device.
摘要:
Licensing aspects of vendor software packages can be protected with reduced user interaction and effort by automating licensing exploit identification, and if allowed, exploit correction. Automating licensing exploit detection ensures that known exploits are more quickly and efficiently discovered to help maintain genuine software status. Minimizing user interaction in licensing exploit detection and correction involves less disruption to users and generally supports increased user satisfaction with vendor software package usage.
摘要:
The present application provides a pruning machine with an extendible rod. The pruning machine also includes a main body and a battery pack. The main body has a housing, a blade group, a motor, a transmission device and a switch on the outside of the housing. The battery pack has a plug to connect with a socket on the main body. One end of the extendible rod has the same plug as the battery pack to connect with the socket of the main body plug and the other end has the same socket of the main body to receive the plug of the battery pack. By using the same plug and socket structure throughout, the present application provides good adaptability and is suitable for a wide range of pruning operations.
摘要:
Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data.
摘要:
Methods and systems for phase current reconstruction are disclosed. An example method comprises: sampling a current from a power stage comprising: three phase legs, a current sensor to measure a dc-link current, and three more current sensors configured to measure three summations of currents for the power stage, storing the sampled current into a current stack if the sampled current comes from a survived sensor and is one of the phase currents from the switching state in the state stack, and reconstructing an unknown phase current by using the previously stored currents along with the sampled current to calculate the unknown phase current. Other embodiments are described and claimed.
摘要:
The present invention provided a simple three-step approach based on the combinational induction with activin A, all-trans retinoic acid and, optionally, other maturation factors which are able to induce embryonic stem cells to differentiate into insulin-producing cells. A kit used to induce embryonic stem cells to differentiate into insulin-producing cells was also provided.
摘要:
Methods and systems for energy management are disclosed. An example system includes a first port connected to an energy storage device for bidirectional flow of energy, a second port connected to an energy source device for unidirectional flow of energy, a third port connected to a utility grid for bidirectional flow of energy, and a unified control system with control logic configured to simultaneously control energy flow between the first, second, and third ports based on at least two factors from the group consisting of: a state of charge of the energy storage device, a state of the energy source device, and a state of the utility grid. Other embodiments are described and claimed.
摘要:
A magnetic bearing system and related method that utilizes self-sensing in order to determine and adjust the position of a shaft within the bearing. Magnetic bearings levitate a rotating object with a magnetic field and are unstable in open-loop operation. Position feedback control is required to maintain a rotor in a centered position. The system and related method uses a unique design to sense the position of the rotating object with greater accuracy. It comprises coils which are used both to detect and adjust the position of the rotating object and a control system which supplies signals in a time-multiplexed manner in order to determine the position with accuracy while still allowing the same coils that are used to detect position to also supply a field to control the position of the rotor.
摘要:
Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data.
摘要:
Several approaches to selectively filtering network traffic are described. One approach involves a system for selectively filtering network traffic. The system includes a helper application, which is coupled to a networking program, and is used to identify a user-initiated request. A network filter driver is coupled to the networking program, for intercepting the user-initiated request. A filtering service is coupled to both the helper application and the network filter driver, and is used to determine if the user-initiated request is allowable. If the request is allowable, the filtering service is configured to generate a special identifier, which the helper application is configured to include in a subsequent request. The filtering service is configured to allow a subsequent request which includes the special identifier, and the network filter driver's configured to strip a special identifier from subsequent requests.