摘要:
User credentials are validated within a network infrastructure element such as a packet data router or switch. The network element has authentication and authorization logic for receiving one or more packets representing an input application message logically associated with OSI network model Layer 5 or above; extracting user credentials from the one or more packets; authenticating an identity associated with the user credentials; authorizing privileges to the identity; and forwarding the application message to an intended destination if the identity is successfully authenticated and/or authorized. The authentication and authorization logic in the network element can invoke extension authentication and authorization methods that may be provisioned after the network element is deployed in a networked system.
摘要:
Application message payload data elements are transformed within a network infrastructure element such as a packet data router or switch. The network element has application message transformation logic for receiving one or more packets representing an input application message logically associated with OSI network model Layer 5 or above; extracting an application message payload from the input application message; identifying one or more first content elements in the application message payload; transforming the first content elements into one or more second content elements of an output application message; and forwarding the output application message to a destination that is identified in the input application message. Transformations performed in the network element can include field reordering, field enrichment, field filtering, and presentation transformation.
摘要:
Methods and systems consistent with the present invention provide dynamic security policies that change the granularity of the security at the node level, process level, or socket level. Specifically, a channel number and virtual address are associated with various processes included in a process table. Since a security policy is required for all processes, secure and insecure processes located on the same channel may communicate with one another. Moreover, processes located on different channels may communicate with one another by a gateway that connects both channels. This scalable blanketing security approach provides an institutionalized method for securing any process, node or socket by providing a unique mechanism for policy enforcement at runtime or by changing the security policies.
摘要:
A programmable energy efficient codec system is provided for encoding and decoding a plurality of application environments. A camera Codec and control system for an HD camera is provided for encoding uncompressed HD-SDI video signals into an MPEG-2 transport stream. A stand-alone encoder decoder system is provided in a network configuration allowing for remote display and editing of HD-SDI video. At least one plurality of HD-SDI transport streams is generated from HD-Cameras encoded into MPEG-2 transport streams and output into a DVD-ASI signal and a TS/IP packet stream further provided is a decoder which accepts MPEG-2-TS/IP packet streams from a routed IP network which are decoded into an uncompressed HD-SDI transport stream for display. A set top box is provided for decoding audio and video HD-TV. A first HDMI interface into the decoder allows acceptance of an MPEG-2-TS from local storage media. Connection to an IP routed network is provided. The set top box may also request product specific decoder algorithms from a centralized manager. A kernel is provided in software which enables dramatic power reduction and ease of system update.
摘要:
The present invention provides spray-dried polyene compositions for oral inhalation to the lung. The polyene antifungal compositions demonstrate superior aerosol properties, do not exhibit appreciable degradation of the polyene upon spray-drying, and are useful in the treatment and prophylaxis of both pulmonary and systemic fungal infections.
摘要:
A system and/or method that enables hosting entities, such as application service providers (ASPs) to identify target sources (e.g. domains) for data traffic is provided. Additionally, data traffic can be segmented as a function of available sources and subsequently directed to specific hosting environments thereby affording the ASP ability to efficiently scale resources. Further, the segmented data traffic and corresponding environments enable the ASP to more effectively secure client resources and data by applying back-end filters and other suitable security mechanisms that correspond with a traffic-specific security policy that can be tagged to the traffic for use throughout distribution.
摘要:
Methods and systems consistent with the present invention provide a Supernet, a private network constructed out of components from a public-network infrastructure. Supernet nodes can be located on virtually any device in the public network (e.g., the Internet), and both their communication and utilization of resources occur in a secure manner. As a result, the users of a Supernet benefit from their network infrastructure being maintained for them as part of the public-network infrastructure, while the level of security they receive is similar to that of a private network. The Supernet has an access control component and a key management component which are decoupled. The access control component implements an access control policy that determines which users are authorized to use the network, and the key management component implements the network's key management policies, which indicate when keys are generated and what encryption algorithm is used. Both access control and key management are separately configurable. Thus, the Supernet provides great flexibility by allowing different key management policies to be used with the same access control component.
摘要:
Mold press apparatus for use in the manufacture of molded articles, particularly starch-bound containers and other articles. The mold press apparatus includes a planar array of female mold halves and a corresponding planar array of male mold halves. The planar array of mold halves remain substantially coplanar throughout the process of selectively mating and separating the male and female mold halves. When used to manufacture molded articles from aqueous starch-based compositions, the molds are equipped with venting means, such as vent holes and/or a vent gap, which allow for the escape of water vapor from the mold cavities defined by the mated male/female mold pairs. A suction removal system may be used to remove the molded articles from the mold press apparatus, typically from the female mold halves. The demolded articles are deposited on a conveyor system equipped with individual nests for each article.
摘要:
A method and system of converting biomass to biochar in a hydrothermal carbonization apparatus wherein subcritical water at a temperature of 230-350° C. and 500-3000 psi is reacted with the biomass to form biochar, biocrude and gases. The method and system include recycling the biocrude back to the hydrothermal carbonization apparatus which improves biochar yield and provides water for the biomass reaction to occur.