摘要:
A Subscriber Information Service Center (SISC) in a wireless telecommunications network provides location and status information about identified mobile subscribers to a requesting subscriber. The requesting subscriber may access the SISC by e-mail. The SISC retrieves the location information from the mobile subscriber's HLR, and returns the requested information by e-mail or by posting the information on a Web site associated with the SISC. A SIP proxy in the SISC enables a second-generation mobile subscriber to request information for other mobile subscribers. The SISC may also retrieve status information from the MSC serving the mobile subscriber relating to any ongoing call by the mobile subscriber.
摘要:
The present invention provides for an apparatus and method for use in a system with an x-ray source to produce a pencil beam of x-rays to scan an object and a first detector providing a value representative of the intensity of the x-rays scattered from the object to produce a scattered image having a second detector disposed opposite the first detector to provide a value representative of the intensity of the x-rays passing directly from the x-ray source to the second detector; a processor coupled to the system to receive information specifying a position of the pencil beam of x-rays, the processor also coupled to second detector to produce a shadow image formed of pixels indicating the intensity value measured by the second detector for a plurality of positions of the pencil beam of x-rays; and combining the scattered and shadow image to produce a composite image.
摘要:
A pencil beam of X-rays is scanned over the surfaces of the body of a person being examined as the person walks through the scanning apparatus. Specifically, a tracking assembly is employed to rotate the scanning plane through a tracking angle and in a direction progressing from the entrance to the exit of the portal, through which the person passes, in order to substantially track the person or body as it moves with respect to the system from the entrance to the exit X-rays that are scattered or reflected from the subject's body are detected by a detector assembly. The signal produced by this scattered X-ray detector in then used to modulate an image display device to produce an image of the subject and any concealed objects carried by the subject. The detector assembly is constructed in a configuration to automatically and uniformly enhance the image edges of low atomic number (low Z) concealed objects to facilitate their detection. A storage means is provided by which previously acquired images can be compared with the present image for analyzing variances in and similarities with the present image, and provides means for creating a generic representation of the body being examined while suppressing anatomical features of the subject to minimize invasion of the subject's privacy.
摘要:
Included are multiple component elastic fibers prepared by a solution-spinning process such as dry spinning or wet spinner of spandex fibers including polyurethaneurea and polyurethane compositions. These fibers have a cross-section including at least two separate regions with definable boundaries wherein at least one region defined by the boundaries of the cross-section includes a polyurethaneurea or polyurethane composition. One region of the fiber includes a fusibility improvement additive to enhance adhesion to itself or to a substrate.
摘要:
A system and method for providing secure access to a computer system. An access device divides the password into multiple segments and places them in data packets. In one embodiment, an authentication server has multiple addresses, and each packet is sent to a different address. The server then reassembles the password. In another embodiment, when the server receives a password, the server sends an index value back to the access device, which then accesses the server on another address indicated by the index value. Alternatively, the password is sent to multiple addresses for the server, and the server determines whether any of the received packets have been altered. The multiple password packets may be forced to follow different paths to the server, thereby denying hackers the ability to intercept all of the password characters or determine the inter-packet timing factor. The system is effective against passive and active hackers, Trojans, and phishing techniques.
摘要:
A client device, system, and method for constructing a two-factor password utilized by an authentication device to authenticate an accessing computer. The client device connects to the accessing computer through an input/output (I/O) port such as a USB connection. When a user desires to access a network, he enters a user ID, which is sent from the accessing computer to the client device. The client device includes a client application, which retrieves a second factor from an internal database, and combines the user ID and the retrieved second factor to form the two-factor password. The two-factor password is sent to the accessing computer, which transmits it to the authentication device. The accessing computer is authenticated only if both the user ID and the second factor match a user ID and second factor stored in the authentication device.
摘要:
A system and method for providing secure access to a computer system. An access device divides the password into multiple segments and places them in data packets. In one embodiment, an authentication server has multiple addresses, and each packet is sent to a different address. The server then reassembles the password. In another embodiment, when the server receives a password, the server sends an index value back to the access device, which then accesses the server on another address indicated by the index value. Alternatively, the password is sent to multiple addresses for the server, and the server determines whether any of the received packets have been altered. The multiple password packets may be forced to follow different paths to the server, thereby denying hackers the ability to intercept all of the password characters or determine the inter-packet timing factor. The system is effective against passive and active hackers, Trojans, and phishing techniques.
摘要:
A system and method for providing secure access to a computer system. An access device divides the password into multiple segments and places them in data packets. In one embodiment, an authentication server has multiple addresses, and each packet is sent to a different address. The server then reassembles the password. In another embodiment, when the server receives a password, the server sends an index value back to the access device, which then accesses the server on another address indicated by the index value. Alternatively, the password is sent to multiple addresses for the server, and the server determines whether any of the received packets have been altered. The multiple password packets may be forced to follow different paths to the server, thereby denying hackers the ability to intercept all of the password characters or determine the inter-packet timing factor. The system is effective against passive and active hackers, Trojans, and phishing techniques.
摘要:
A sanitizing applicator for applying a liquid sanitizer to a surface. The sanitizer may be a quaternary ammonium compound (QAC)-based or chlorine-based sanitizer containing positively charged ions at an effective concentration level for killing a predefined percentage of microbes present on the surface. The applicator includes a breakable internal reservoir for retaining a quantity of the sanitizer, and a positively charged nonwoven fabric covering the reservoir. The fabric is constructed using a positively charged binder to bind together the strands of the fabric, and is optionally treated with a positively or neutrally charged surfactant. The positive charge of the fabric prevents the fabric from neutralizing the positively charged ions in the sanitizer when the breakable internal reservoir is broken and the sanitizer is applied to the fabric.
摘要:
A lottery-type ticket having a winner indication that enables a player to quickly determine whether the ticket is a winning ticket. The ticket may be a scratch-off ticket or a break-open ticket. The winner indication may be hidden under a scratch-off zone or behind a pull-tab window that is independent and separated from the playing area. Alternatively, the winner indication may be proximate to one or more game indicia that are each hidden under a scratch-off zone or behind a pull-tab window. Speed of play is increased by enabling the player to determine whether the ticket is a winning ticket by either scratching off a single scratch-off zone or opening a single pull-tab window.