Abstract:
Secure establishment of a key associated with a first facility identifier is facilitated. The key is shared between a device and an operator of a first facility, via a public key management infrastructure of a payment system operating according to the payment standard, during a first transaction, substantially in accordance with the payment standard, between the device and the first facility. Controlling access to a first facility is facilitated, via the device, using the key associated with the first facility identifier, substantially without reference to an issuer of the device and substantially without use of asymmetric keys of the device, during a plurality of subsequent transactions, substantially in accordance with the payment standard, between the device and the first facility. The steps can be repeated for a number of different facilities, such as different transit systems, with appropriate rules to address a situation where the device has a limited storage capacity for keys of different transit operators.
Abstract:
A plastic transmission filter (1) composed of mating upper (2) and lower (3) shells of synthetic resin material with at least one set of registering weld posts (10) extending between inner surfaces of the upper and lower shells; a fluid pervious centertube (4) interposed between the mating shells around the weld posts, and a filter material (5) wrapped around the centertube to form a bag filter. The filter assembly can be welded together in a single vibration welding operation and provides enhanced flow of transmission fluid by avoiding flow restrictions caused by prior art reinforcement poles.
Abstract:
Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
Abstract:
Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
Abstract:
A connector assembly includes first and second hoses, a tubular connector, and a clamp. The tubular connector includes first and second radial projections that are spaced apart along an axial direction of the tubular connector. The tubular connector extends into the first hose, and the first radial projection of the tubular connector engages with the inner surface of the first hose. The tubular connector also extends into the second hose, and the second radial projection of the tubular connector engages with the inner surface of the second hose. The first hose extends into the second hose so that the first and second hoses axially overlap in an area between the first and second radial projections of the tubular connector. The clamp engages the outer surface of the second hose in the axially overlapping area of the first and second hoses to clamp the first and second hoses to the tubular connector.
Abstract:
An integrated mass air flow sensor/broadband silencer assembly comprises a molded body having a plurality of walls formed therein. The molded body is over-wrapped with a layer of acoustic foam that, together with the plurality of walls, define a plurality of chambers within an interior volume of the assembly. A mass air flow sensor can be inserted into one of the chambers. The chambers are sized and spaced to provide a uniform velocity, low turbulence air flow to the sensor, and a minimally-restricted air flow to an internal combustion engine located downstream of the assembly.
Abstract:
An improved nebulizer places a venturi in a rainfall chamber and in close proximity to or inside a patient's oral cavity. One or more medicine feed lines feeds the medicine to a location proximate to a venturi. The rainfall chamber contains a sump communicating with the venturi for collecting medication not delivered to the patient and for recycling that medication for delivery to the patient. A medicine receiver may be pre-filled with a standard unit dose of medication.
Abstract:
An air cleaner for a motor vehicle includes a housing having an air inlet opening, an air outlet opening, a secondary air inlet opening and at least one peripheral wall defining a chamber therein. An air filter element is provided and received into the chamber and positioned to separate the air inlet opening from the air outlet opening. A vacuum actuated valve is provided in the secondary air inlet opening of the housing and is in communication with a secondary air portion of a dirty face of the filter element. The valve configured and adapted to automatically change from a closed to an open state when a vacuum in the housing increases to a predetermined vacuum value and then to close when the vacuum decreases below the predetermined value, thereby permitting the vehicle engine to continue to operate even though airflow in the primary air intake may be obstructed.
Abstract:
Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).