摘要:
A self-attaching nut having a central pilot portion projecting from an end face of the body portion, an annular groove in the end face generally surrounding the pilot portion. The annular groove includes an inner side wall adjacent the pilot portion, a bottom wall and an outer side wall, wherein the bottom wall includes a first plurality of circumferentially spaced anti-rotation elements adjacent the inner side wall each having a planar inclined top face and a second plurality of circumferentially spaced anti-rotation elements adjacent the outer side wall each having a planar inclined top face and wherein the outer side wall of the annular groove includes a plurality of circumferentially spaced notches.
摘要:
A self-attaching nut having a central pilot projecting from an end face of the body portion, an annular groove surrounding the pilot and an annular panel support face surrounding the groove, wherein the outer side wall includes a plurality of circumferentially spaced notches, each having an outer wall which extends from the bottom wall of the annular groove to the panel support face and the bottom wall of the groove includes a plurality of circumferentially spaced radial ribs integral with either the outer or inner side walls of the annular groove having a radial end spaced from the opposed side wall and a top face inclined toward the bottom wall of the annular groove providing improved torque resistance and push-off strength. Alternating circumferentially overlapping radial ribs integral with the pilot and the outer groove wall and ribs which extend below the bottom wall of the groove are also disclosed.
摘要:
A circuit for receiving multiple serial datastreams in parallel is disclosed. A bit clock is recovered from each data stream, there being one data bit for each transition of the clock signal both positive and negative going. The phases of the bit clocks are compared and are adjusted by 180 degrees so that the positive going edges of all occur close to each other. The bits of each stream are assembled into words under the control of a word clock. In one embodiment a common word clock is derived form the set of bit clocks as a whole. In another embodiment each stream is provided with its own word clock which is aligned to positive edges of the respective bit clocks that are close to each other.
摘要:
A mechanism is provided for isolating application-specific data in an environment where multiple applications share a same user account. This mechanism enables data specific to an application to be accessed only by the application. When an application requests application-specific data, the data is loaded and a handle to the data is returned to the application. Access to the data is allowed only though the handle. Therefore, only the application possessing the handle can access the data. A counter may be associated with the loaded data. The counter's value is incremented whenever a handle is created for the data and decremented whenever a handle for the data is terminated. When the value of the counter reaches zero, the data is automatically unloaded.
摘要:
A secure process may be created which does not allow code to be injected into it, does not allow modification of its memory or inspection of its memory. The resources protected in a secure process include all the internal state and threads running in the secure process. Once a secure process is created, the secure process is protected from access by non-secure processes. Process creation occurs atomically in kernel mode. Creating the infrastructure of a process in kernel mode enables security features to be applied that are difficult or impossible to apply in user mode. By moving setup actions previously occurring in user mode (such as creating the initial thread, allocating the stack, initialization of the parameter block, environment block and context record) into kernel mode, the need of the caller for full access rights to the created process is removed. Instead, enough state is passed from the caller to the kernel with the first system call so that the kernel is able to perform the actions previously performed using a number of calls back and forth between caller and kernel. When the kernel returns the handle to the set-up process, some of the access rights accompanying the handle are not returned. Specifically, those access rights that enable the caller to inject threads, read/write virtual memory, and interrogate or modify state of the threads of the process are not returned to the caller.
摘要:
A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
摘要:
An electromagnetic logging tool includes a support configured for disposal in a well; at least one antenna mounted on the support; and a plurality of coils mounted on the support proximate the at least one antenna, wherein the plurality of the coils are configured for selective connection with the at least one antenna. A methods for balancing an induction array on an electromagnetic logging tool includes measuring a mutual coupling between a transmitter and a receiver on the electromagnetic logging tool; and selectively connecting a subset of a plurality of coils on the electromagnetic logging tool to the transmitter or the receiver based on the measured mutual coupling.
摘要:
Systems and methods are described for providing security through sessions. In an implementation, a method includes initiating a session, by an operating system, in which operating system services are executable and initiating another session, by the operating system, in which a user-interactive application is executable.
摘要:
A method of forming a female fastener including rolling a body portion strip having a midportion and flange portions on opposed sides of the midportion, piercing spaced openings through the midportion, cutting the strip to length between the openings, cold forming a separate generally cylindrical pilot portion having a length greater than the width of the midportion and a diameter greater than the opening through the midportion, preferably including radial splines, and press fitting the pilot portion through the opening in the midportion. The self-attaching female fastener thus includes a rectangular body portion and a generally cylindrical pilot portion having an end face spaced above a plane of the midportion and may be formed of a harder metal than the body portion.
摘要:
According to one embodiment, an isolation barrier comprises a transformer and a controlled impedance module. The system side device generates an amplitude modulated clock signal when the system side device is in a transmit mode, and generates an unmodulated clock signal when the system side device is in a receive mode. When the system side device is in the receive mode, the controlled impedance module modulates, according to the data being transmitted by the line side device, the unmodulated clock signal incoming from the system side device. The transformer is utilized in bidirectional data transfer to provide the line side device with the amplitude modulated clock signal generated by the system side device, while providing the system side device with the amplitude modulated clock signal generated by the controlled impedance module and the line side device.