Abstract:
Shock absorber having variable damping characteristics. The shock absorber includes a shock absorber cylinder containing a damping medium. A piston rod extends into the shock absorber cylinder. A piston is arranged on a free end of the piston rod. The piston is structured and arranged to divide a space inside the shock absorber cylinder into two chambers. The two chambers are in fluid communication with each other via a main flow channel and a plurality of secondary flow channels. A valve device is structured and arranged to open and close the secondary flow channels. The valve device comprises a plurality of separately controllable spool valves movably arranged on a base member and a plurality of valve members having different flow characteristics. One of the valve members is assigned to one of the secondary flow channels and another of the valve members is assigned to another of the secondary flow channels. This Abstract is not intended to define the invention disclosed in the specification, nor intended to limit the scope of the invention in any way.
Abstract:
A shock absorber wherein the piston of the piston-piston rod assembly divides the internal space of the cylinder into first and second chambers. The piston has first and second passages for the flow of fluid between the chambers in response to shifting the assembly relative to the cylinder and/or vice versa. One of these passages is controlled by a first check valve which prevents the flow of fluid through the one passage from the first chamber into the second chamber. A second check valve prevents the flow of fluid through the other passage from the second chamber into the first chamber. The piston-piston rod assembly further defines a plurality of bypasses each of which is controlled by a solenoid valve as well as by a pressure-responsive valve.
Abstract:
A staff-location and signal system for mines, in which conventional radio telephone devices can be used for producing a radio telephone connection between an exchange and base stations or between the base stations and radio telephone equipment in the mine area. All underground employees, whether they carry radio telephones or not, can be reached by warning signals or staff-location signals sent via apparatus carried by the employees. To this end, the miner's lamps are associated with radio receivers which respond to cooled signals transmitted by the base station and thereupon actuate a switching device. The normally-closed working-current circuit of the lamp contains a switch which can be operated by the actuated switching device so that it switches the miner's lamp on and off. In this manner all miners can be raised when necessary by warning or staff-location signals in the form of flashes. Alternatively, switching devices actuated by the coded radio signals can be associated with some lamps in the general lighting system so as to provide warning signals which are clearly visible even in strongly-illuminated areas.
Abstract:
A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in addition, the user can define a second input mode based on face recognition plus IR sensing satisfying a threshold to ensure a live person is being imaged for authentication, and/or face recognition plus a particular facial expression such as a smile and wink.
Abstract:
According to one embodiment of the invention, a method for setting permission levels is described. First, an application and digital signature is received by logic performing the permission assessment. Then, a determination is made as to what permission level for accessing resources is available to the application based on the particulars of the digital signature. Herein, the digital signature being signed with a private key corresponding to a first public key identifies that the application is assigned a first level of permissions, while the digital signature being signed with a private key corresponding to a second public key identifies the application is assigned a second level of permissions having greater access to the resources of an electronic device than provided by the first level of permissions.