摘要:
An aircraft (10) having turboprop propulsion has a plurality of gas turbine engines (11), each with a two stage reduction gearbox (30,41) with the engine output shaft (17,17A) inline with the propeller drive output shaft (19,51) to drive a propeller (12) in front of the engine in a tractor mode of propulsion. The input gear reduction stage (20) and output gear reduction stage (21) share a plurality layshafts (22,38) mounted in fixed circularly-spaced relation to each other about the axis of the output shafts in the mechanical housing in the aircraft. Each layshaft of said plurality of layshafts has a layshaft first end toward the rear, input end of the gearbox, and a layshaft second end toward the output, front end of the gearbox. The layshaft gears are arranged to avoid any net thrust loading of the layshafts. Spur (26) and double helical (27) are used in FIG. 4, while spur gears 37 and 48 are used in FIG. 6 with suitable helix settings to neutralize end thrust on layshaft 38. Cantilever layshaft input gear (37) mounting in rear bearings (39) enables it to share some layshaft output gear 48 load sharing with the front bearing (40). A torquemeter (61) is conveniently situated at the gearbox input end. The engine output gear (25,36) and gearbox output gear (28,49), and propeller (12) all have colinear rotational axes.
摘要:
Evidence-based application security may be implemented at the application and/or application group levels. A manifest may be provided defining at least one trust condition for the application or application group. A policy manager evaluates application evidence (e.g., an XrML license) for an application or group of applications relative to the manifest. The application is only granted permissions on the computer system if the application evidence indicates that the application is trusted. Similarly, a group of applications are only granted permissions on the computer system if the evidence indicates that the group of applications is trusted. If the application evidence satisfies the at least one trust condition defined by the manifest, the policy manager generates a permission grant set for each code assembly that is a member of the at least one application. Evidence may be further evaluated for code assemblies that are members of the trusted application or application group.
摘要:
A method and system for using an Internet client's local authentication mechanism in systems having updated browser code, so as to enable third party authentication according to an authentication scheme specified by a participating server on clients with updated browser code, while not breaking clients with legacy browser code. A redirect response from a server has authentication data added thereto such that updated browser code can detect the data's presence and enable the use of local security mechanisms for authentication purposes with the server-specified authentication scheme, including local credential entry for verification at a third party login server. At the same time, if such a redirect response is received by prior browser code, the added data is ignored while conventional redirection occurs, such that third party authentication may be performed via redirection to a third party's Internet page that provides a form for credential entry.
摘要:
A gear reduction gearbox connected to a gas turbine engine to reduce the shaft speed and increase the output torque. In one form of the present invention an input shaft and an output shaft are rotatable within a mechanical housing. A face gear set connects between the shafts for changing the speed of the output shaft relative to the input shaft. The present invention, in one embodiment includes load sharing wherein a plurality of pinion gear assemblies distribute the load transmitted through the gearbox.
摘要:
The devices and methods taught in this disclosure are directed to facilitate the observation, collection, transportation, storage, and preservation of specimens possibly containing DNA, said specimens potentially constituting evidence of sexual assault. The devices and methods described further allow for a means of minimizing the possibility of specimen contamination, dilution, or degradation during the collection and storage processes. The disclosed devices may contain electrical components that provide for the generation and recordation of information (specifically, times, dates, and locations) related to circumstances surrounding the collection of such specimens. This information may serve as evidence corroborating the circumstance of specimen collection, it may help to maintain a known and identifiable Chain of Custody (CoC), and it may additionally be used for unique device identification (UDI), inventory control, and current procedural terminology (CPT) coding purposes.
摘要:
Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a resource based on a resource based policy despite denial of the access based on a static policy associated with the client security system. The granting of access coincides with the determination that the threat to a user or the user's information is not increased should the access be granted.
摘要:
A method and system for using an Internet client's local authentication mechanism in systems having updated browser code, so as to enable third party authentication according to an authentication scheme specified by a participating server on clients with updated browser code, while not breaking clients with legacy browser code. A redirect response from a server has authentication data added thereto such that updated browser code can detect the data's presence and enable the use of local security mechanisms for authentication purposes with the server-specified authentication scheme, including local credential entry for verification at a third party login server. At the same time, if such a redirect response is received by prior browser code, the added data is ignored while conventional redirection occurs, such that third party authentication may be performed via redirection to a third party's Internet page that provides a form for credential entry.
摘要:
Described is a system and method by which an application program is evaluated for trustworthiness based on the permissions and/or privileges it requests relative to a program category. The program describes the permissions needed to operate, and identifies itself as belonging to a particular category. Security components compare the requested permission set against the permissions that programs of that category actually need in order to operate properly. Programs requesting more permissions than needed are deemed untrustworthy. For example, screen saver application programs need only a limited permission set to operate properly, including full screen access and the ability to read files, but do not need network access permissions or write access to files. Any screensaver application that requests only the needed permission set is deemed trustworthy, while others that request permissions beyond what is actually needed are not deemed trustworthy, and a user or automated policy process may then intervene.
摘要:
Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with multiple independent networks (e.g., domains) may be established and maintained. Moreover, a credential manager provides a credential model retrofit for legacy applications that only understand the password model. The manager provides a mechanism where the application is only a “blind courier” of credentials between the trusted part of the OS to the network and/or network resource. The manager fully insulates the application from “read” access to the credentials. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.