摘要:
The present invention provides a system, method, and computer-readable medium for identifying malware that is loaded in the memory of a computing device. Software routines implemented by the present invention track the state of pages loaded in memory using page table access bits available from a central processing unit. A page in memory may be in a state that is “unsafe” or potentially infected with malware. In this instance, the present invention calls a scan engine to search a page for malware before information on the page is executed.
摘要:
A method for refining aqueous suspended fibers, the fibers being paper fibers or pulp fibers including the steps of leading, pressing, forming, temporarily attaching, supplying and discharging. The leading step includes leading the aqueous suspended fibers through at least one refining zone which is located between an inside wall of a rotating refiner drum and at least one refiner roll, the refiner roll rotating in association with the refiner drum. The pressing step includes pressing the refiner roll and the refiner drum against each other thereby causing a mechanical refining force to be transferred to the fibers so that strength properties of paper produced therefrom are altered. The forming step includes forming a fibrous stock layer on the inside wall of the rotating refiner by the aqueous suspended paper fibers. The temporarily attaching step includes temporarily attaching the fibrous stock layer to the inside wall due to rotation. The supplying step includes supplying a continuous flow of liquid with the aqueous suspended paper fibers to the fibrous stock layer. The discharging step includes discharging the liquid from the fibrous stock layer.
摘要:
A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications and the supervisory process may operate on a host system of the computer, which may also provide a platform for execution of the one or more self-contained operating environments. The security scheme protects processes running in the one or more self-contained operating environment and processes running on the computer outside of the self-contained operating environments.
摘要:
Methods, systems, and computer program products for authenticating a mobile client that may have an input system optimized for numeric input. A mobile gateway receives authentication credentials from a mobile client and uses an authentication filter to map the authentication credentials according to pre-established criteria. The authentication filter may change the domain name, the username, or both. Then, the mapped authentication credentials are sent to a network that includes the content server being accessed. Any access privileges granted to the mobile client are based on the mapped authentication credentials. The mobile gateway may be configured to accept connections only from known servers. Mobile authentication credentials may be maintained in one or more domains, possibly having a trust relationship, or may be stored in a separately administered credential database.
摘要:
Methods, systems, and computer program products for negotiating a secure end-to-end connection using a proxy server as an intermediary. The client first negotiates a secure connection between the client and the proxy so that any credentials exchanged will be encrypted. After the exchange of authentication credentials, the secure client-proxy connection is altered so that no further encryption takes place. The client and server then negotiate a secure end-to-end connection through the proxy, with the secure end-to-end connection being encapsulated within the insecure client-proxy connection. In this way, the overhead of creating a separate client-proxy connection for the secure end-to-end connection may be avoided, but the insecure client-proxy connection introduces only minimal overhead because it no longer encrypts any data that it carries.
摘要:
Methods, systems, computer program products and data structures are described which allow a client to communicate with a server even though multiple proxies that require different authentication data must be traversed to allow such communication. In operation, the client first authenticates to a first proxy using authentication data appropriate for the first proxy. The client then authenticates to a second proxy using different authentication data that is appropriate for the second proxy. This proxy authentication continues through as many proxies as necessary until the client is in communication with the server.
摘要:
For recording selected content for later playback from a broadcast, a recording process records at least one content item for later playback, identifying that content item using its content and storing a respective item identifier indicative of the content item for that content item.
摘要:
The invention relates to novel Borrelia, and OspA antigens derived therefrom. These antigens show little homology with known OspA's and are therefore useful as vaccine and diagnostic reagents. Multicomponent vaccines based on OspA's from different Borrelia groups are also disclosed.
摘要:
An interface between a protected computer or computer network and the World Wide Web (WWW). The interface comprises a split proxy system that encapsulates TCP/IP transmissions into a script transmission, which is not subject to problems in high latency systems, thereby greatly improving WWW access, via a wireless modem or other low-bandwidth communications network. The split proxy interface also provides compression, encryption and filtering capabilities and allows receipt of unsolicited transmissions from the service provider for such purposes as automatically updating or configuring WWW access software.
摘要:
The present invention provides a vaccine against Lyme disease, wherein it contains one or more monoclonal antibodies which are specific for the 31 kD antigen (OspA) or the 34 kD antigen (OspB) of Borrelia burgdorferi.The present invention also provides a process for obtaining this vaccine, as well as new monoclonal antibodies and antigens.