摘要:
The present invention is directed towards a novel procedure and system for making a security tag for an aluminum-pressed, cardboard container. The method employs a system of distancing the tag from the container and a method of calibrating the tag. The tag is then inserted into a specially designed cap and spaced a given distance from the container. The product is sealed and then sold to the consumer.
摘要:
Providing secure end-to-end notifications from a notification source to a notification sink despite the notification mechanism including one or more message transit points between the notification source and the notification sink. Initially, security information (e.g., the master security, the cryptographic algorithm, and the like) is negotiated out-of-band from the one or more message transit points so that the message transit points are not apprised of the security information. When a designated event occurs, the notification source generates a push message that includes the notification encrypted using the pre-negotiated security information. When the notification sink receives the push message, the notification sink decrypts the notification using the pre-negotiated security information, as well as supplemental information provided in the push message. Thus, the message transit points only have access to the encrypted form of the notification.
摘要:
Methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile and optionally determines offsets for select tiles. Further, the tiling optionally relies on probability and/or entropy. An exemplary password system includes an image; a grid associated with the image, the grid composed of polygons; an index associated with each polygon; and an offset associated with each polygon wherein password identification relies on one or more indices and one or more offsets.
摘要:
Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UIs in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
摘要:
A system and method for renting or purchasing products, preferably digital media. The system comprises a self-check station and unique locking apparatus for the media. The method includes a procedure to both rent and return the media without the aid of borrowing facility personnel.
摘要:
An axle assembly includes a shaft supported for rotation within an axle housing. The housing is mountable to a trailing arm pivotal relative to a vehicle. The axle shaft includes a hub mounted on a first end for mounting of a wheel. A rotor is mounted to a second portion of the axle. The second portion of the axle shaft and rotor is mounted at a position inboard of any portion of the wheel rim. Mounting of the rotor outside any portion of the wheel rim allows the rotor, caliper, and actuator to be configured without constraints on size and cooling concerns inherent with brake assemblies positioned within the circumference of the wheel rim.
摘要:
A brake caliper includes an actuator, a moveable brake pad including a brake pad backplate having a generally planar portion, and a friction material secured to the brake pad backplate. The brake pad backplate is being generally arcuate in shape and defines a friction material outer radius and has a friction face for engagement with a brake disc. The brake pad defines a wear limit of the friction material at a wear limit plane that is parallel to the friction face. The brake pad backplate includes a first pad abutment to limit rotation of the brake pad in a first direction. The first pad abutment is defined on a first lug surface of a first lug projecting from the generally planar portion, and the first lug surface is at a radius larger than the friction material outer radius and is positioned on the friction face side of the wear limit plane. The brake caliper also includes a stationary brake pad and a frame having a housing region for receiving the actuator, a reaction side portion for receiving the stationary brake pad in an axially static manner, and a first bridge arm connecting the housing region to the reaction side portion. The actuator is operable to move the moveable brake pad towards the stationary brake pad. The first pad abutment engages a first bridge abutment on the first bridge arm to limit rotation of the brake pad in the first direction.
摘要:
A brake and actuator assembly includes a brake housing (4), an actuator device (6) mounted on the housing, the actuator having a force transmission element (7) extending through an opening (8) in the housing and cooperating with an actuating member (10) of the brake within the housing. A seal (12) is arranged to seal around both the opening (8) and element (7) whilst permitting the latter to move in a direction longitudinally of the element for brake actuation. The sealing element has a portion (14A) arranged for sealing engagement with the member (10) at least when that member is in its inoperative rest position.
摘要:
A method for interacting with a user, comprising communicating with at least one cooperative server through a normal browser; automatically receiving encrypted data having an associated received type code indicative of a requirement for a secure browser having restricted functionality with respect to a functionality of the normal browser; selectively and automatically invoking the secure browser for handling of the received encrypted data based on the received type code associated with the received encrypted data; receiving the encrypted data with the invoked secure browser for handling thereof, wherein the received encrypted data is not available for use by the user in the normal browser and the invoked secure browser imposes restrictions on availability outside of the secure browser of decrypted data derived from the encrypted data; and communicating an input from the user, through the secure browser, to the at least one cooperative server.