Abstract:
A secure card reader (1) includes several security measures. Access to the reader's main circuitry is prevented by an enclosure (9) whose walls contain embedded i conductive paths (18a, 18b, 18c). Breaking or grounding of one of these paths can be detected electronically. A similar arrangement of conductive paths prevent enlarging of a card receiving slot (9c) If tampering is detected using the embedded conductive paths (18a, 18b, 18c), the reader's memory (69) is wiped. The enclosure (9) has apertures (20) in its walls and is held in place by a potting material that extends into the apertures. Means (31, 35) is also provided to detect attempts to probe behind a keypad membrane (7). The contacts (42) for the chip of a chip card are arranged so that their leads all extend away from the card insertion slot.
Abstract:
Compound of formula (I) or a pharmaceutically-acceptable salt thereof, formula (I) wherein Ar is optionally substituted phenyl; R1 is selected from: formula a) or b) (wherein is a single or double bond); R5, R6, R7 and R8 are for or alkyl; R4 is selected from hydrogen, (3-4C)cycloalkyl and optionally substituted (1-4C)alkyl; R10 is for example selected from hydrogen, (1-4C)alkyl, (3-6C)cycloalkyl(1-4C)alkyl, hydroxy(1-4C)alkyl, (1-4C)alkoxy, aryl(1-4C)alkyl; Y is carbon and Ring A is optionally substituted phenylene; or each Y may independently be carbon or nitrogen and Ring A is optionally substituted 5- or 6-membered, heteroarylene ring; R11 is selected from hydrogen and optionally substituted phenyl; p is independently at each occurrence 0, 1 or 2; are described. Processes for making such compounds and their use as DPP-IV inhibitors in the treatment of diabetes are also described.
Abstract translation:式(I)化合物或其药学上可接受的盐,式(I)其中Ar是任选取代的苯基; R 1选自:式a)或b)(其中是单键或双键); R 5,R 6,R 7和R 8是用于或烷基的; R 4选自氢,(3-4C)环烷基和任选取代的(1-4C)烷基; R 1是例如选自氢,(1-4C)烷基,(3-6C)环烷基(1-4C)烷基,羟基(1-4C)烷基,(1-4C)烷氧基 ,芳基(1-4C)烷基; Y是碳,环A是任选取代的亚苯基; 或每个Y可以独立地为碳或氮,并且环A为任选取代的5或6元杂亚芳环; R 11选自氢和任选取代的苯基; p在每次出现时独立地为0,1或2; 被描述。 还描述了制备这些化合物的方法及其作为DPP-IV抑制剂在治疗糖尿病中的用途。
Abstract:
A self-attaching nut having a central pilot portion projecting from an end face of the body portion, an annular groove in the end face generally surrounding the pilot portion. The annular groove includes an inner side wall adjacent the pilot portion, a bottom wall and an outer side wall, wherein the bottom wall includes a first plurality of circumferentially spaced anti-rotation elements adjacent the inner side wall each having a planar inclined top face and a second plurality of circumferentially spaced anti-rotation elements adjacent the outer side wall each having a planar inclined top face and wherein the outer side wall of the annular groove includes a plurality of circumferentially spaced notches.
Abstract:
A self-attaching nut having a central pilot projecting from an end face of the body portion, an annular groove surrounding the pilot and an annular panel support face surrounding the groove, wherein the outer side wall includes a plurality of circumferentially spaced notches, each having an outer wall which extends from the bottom wall of the annular groove to the panel support face and the bottom wall of the groove includes a plurality of circumferentially spaced radial ribs integral with either the outer or inner side walls of the annular groove having a radial end spaced from the opposed side wall and a top face inclined toward the bottom wall of the annular groove providing improved torque resistance and push-off strength. Alternating circumferentially overlapping radial ribs integral with the pilot and the outer groove wall and ribs which extend below the bottom wall of the groove are also disclosed.
Abstract:
A circuit for receiving multiple serial datastreams in parallel is disclosed. A bit clock is recovered from each data stream, there being one data bit for each transition of the clock signal both positive and negative going. The phases of the bit clocks are compared and are adjusted by 180 degrees so that the positive going edges of all occur close to each other. The bits of each stream are assembled into words under the control of a word clock. In one embodiment a common word clock is derived form the set of bit clocks as a whole. In another embodiment each stream is provided with its own word clock which is aligned to positive edges of the respective bit clocks that are close to each other.
Abstract:
A mechanism is provided for isolating application-specific data in an environment where multiple applications share a same user account. This mechanism enables data specific to an application to be accessed only by the application. When an application requests application-specific data, the data is loaded and a handle to the data is returned to the application. Access to the data is allowed only though the handle. Therefore, only the application possessing the handle can access the data. A counter may be associated with the loaded data. The counter's value is incremented whenever a handle is created for the data and decremented whenever a handle for the data is terminated. When the value of the counter reaches zero, the data is automatically unloaded.
Abstract:
An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.
Abstract:
A secure process may be created which does not allow code to be injected into it, does not allow modification of its memory or inspection of its memory. The resources protected in a secure process include all the internal state and threads running in the secure process. Once a secure process is created, the secure process is protected from access by non-secure processes. Process creation occurs atomically in kernel mode. Creating the infrastructure of a process in kernel mode enables security features to be applied that are difficult or impossible to apply in user mode. By moving setup actions previously occurring in user mode (such as creating the initial thread, allocating the stack, initialization of the parameter block, environment block and context record) into kernel mode, the need of the caller for full access rights to the created process is removed. Instead, enough state is passed from the caller to the kernel with the first system call so that the kernel is able to perform the actions previously performed using a number of calls back and forth between caller and kernel. When the kernel returns the handle to the set-up process, some of the access rights accompanying the handle are not returned. Specifically, those access rights that enable the caller to inject threads, read/write virtual memory, and interrogate or modify state of the threads of the process are not returned to the caller.
Abstract:
A method of controlling access to network services enables an authorized proxy client to access a service on behalf of a user. To permit the client to function as a proxy, the user registers proxy authorization information with a trusted security server. The proxy authorization information identifies the proxy client and specifies the extent of proxy authority granted to the proxy client. When the proxy client wants to access a target service on behalf of the user, it sends a proxy request to the trusted security server. The trusted security server checks the proxy authorization information of the user to verify whether the request is within the proxy authority granted to the proxy client. If so, the trusted security server returns to the proxy client a data structure containing information recognizable by the target service to authenticate the proxy client for accessing the target service on behalf of the user.
Abstract:
An electromagnetic logging tool includes a support configured for disposal in a well; at least one antenna mounted on the support; and a plurality of coils mounted on the support proximate the at least one antenna, wherein the plurality of the coils are configured for selective connection with the at least one antenna. A methods for balancing an induction array on an electromagnetic logging tool includes measuring a mutual coupling between a transmitter and a receiver on the electromagnetic logging tool; and selectively connecting a subset of a plurality of coils on the electromagnetic logging tool to the transmitter or the receiver based on the measured mutual coupling.