Abstract:
The present invention utilizes a hardware Window Storage Protection Controller (WSPC) and an Object Encapsulation Enforcement Manager (OEEM) to limit access to object data to only those methods which are encapsulated by the object. All of the objects of the computer system which require protection are stored in protected storage by a base storage protection mechanism so that only the mechanisms of the present invention can deny or permit access to the data encapsulated by the objects.
Abstract:
FIG. 1 is a front, right perspective view of a portable lamp showing my new design; FIG. 2 is a bottom, right perspective view thereof; FIG. 3 is a rear, left perspective view thereof; FIG. 4 is a front elevational view thereof; FIG. 5 is a rear elevational view thereof; FIG. 6 is a left side elevational view thereof; FIG. 7 is a right side elevational view thereof; FIG. 8 is a top plan view thereof; and, FIG. 9 is a bottom plan view thereof. The dashed broken lines depict portions of the portable lamp that form no part of the claim.
Abstract:
The present invention provides a deactivation method of multimedia broadcast multicast service for wireless communication system, comprising steps of: in SGSN, completing the context deactivation of user equipment of broadcast multicast service; in the user equipment, completing the context deactivation of user equipment of multimedia broadcast multicast service; in GGSN, completing the context deactivation of user equipment of multimedia broadcast multicast service; characterized by further comprising steps of: in SGSN, after completing the context deactivation of user equipment of multimedia broadcast multicast service, completing the context deactivation of user equipment of multimedia broadcast multicast service in a radio network controller of a radio access network. According to the method of the present invention, the context of user equipment of multimedia broadcast multicast service in the radio network controller is deleted, so that the waste of radio resources is prevented, the hidden troubles induced by the inconsistency of data among the network elements is removed, and a foundation for the correct realization of future products is laid.
Abstract:
An electronic pencil reads color information from a first color signal wirelessly sent from a drawing board, controls a color unit in the electronic pencil to indicate a corresponding color according to the read color information, and transmits a second color signal as a reply to the first color signal to the drawing board. The drawing board displays track having the corresponding color when a user draws on the drawing board using the electronic pencil.
Abstract:
Disclosed herein is a method of fabricating an antenna in which a flexible stamp is formed from a first wafer, the first wafer transferring a pattern to the flexible stamp, in which an antenna substrate is shaped into a three-dimensional contour with a second mold, in which the flexible stamp is positioned in the second mold to deform the flexible stamp into the three-dimensional contour, and in which a metallic layer on the flexible stamp is cold welded to create a set of antenna traces on the antenna substrate in accordance with the pattern. The antenna traces may then be electroplated.
Abstract:
The disclosure provides a method for clearing computer data and a computer. The method comprises: a computer receiving a command for clearing data through a wireless network, or sensing that the computer is disassembled and then generating the command for clearing data; and the computer clearing data in the memory of the computer. In the disclosure, the computer is powered on and started only upon obtaining a starting authorization of a user, so as to improve confidentiality of computer data; and further, the data can be cleared or be not cleared according to whether it is successful to match a password, or the data can be cleared after obtaining a command of a user if it is not successful to match the password. Therefore, the confidentiality of user data is improved, and the user data is kept confidential and is prevented from being leaked.
Abstract:
A method for processing Forward Error Correction, FEC, data, which includes: a sender encapsulates the FEC data to be a Transport Stream, TS, message, sets FEC identification information in the TS message, and encapsulates the TS message to be a Real-time Transport Protocol, RTP, message; then sends the RTP message to a terminal side. The reception end receives the RTP message; if the reception end has a function for FEC decoding, the reception end identifies the FEC data according to the FEC identification information in the TS message of the received RTP message, and recovers the missed media message according to the FEC data; if the reception end does not have the function for FEC decoding, the reception end processes the RTP message after removing the message header. The embodiments of the present invention also provide a transmission and processing device.
Abstract:
The invention relates to modified single domain antigen binding molecules, e.g., SDAB molecules, in particular TNFα-binding SDAB molecules. Method of preparing, and using the modified single domain antigen binding molecules described herein, to treat, e.g., TNFα-associated disorders, are also disclosed.
Abstract:
The present invention relates to an engineering design method and a system of implementing same. In one embodiment, the method includes a construction process of knowledge components and a design process based on the knowledge components. The knowledge components pack universal modules in the standard forms. Accordingly, the knowledge components are independent from design layouts or design processes of products, and reusable in different projects and platforms. The design process integrates a variety of software platforms via a uniform environment and calls the knowledge components to complete the engineering designs. Further, the design process defines a data relation and an execution relation of the knowledge components and establishes a relationship between the knowledge components without programming. The universal module comprises at least operations, methods, rules and/or flows of an engineering design process and engineering analysis process.