摘要:
A computer is modified to add a memory management module between a memory controller and memory. The module may control or intercept signals between the memory controller and the memory to disable a portion or all of the computer's normal function. The memory management module may be a discrete device or may be part of the memory controller itself.
摘要:
A cash dispensing automated banking machine (10) includes a user interface (12) including an opening (20). Users of the machine deliver individual sheets and stacks of sheets to and from the machine through the opening. Stacks of sheets may include sheets such as notes, checks or other documents. Stacks input to the machine may include mixtures of various types of sheets. The machine operates to receive notes, process checks and perform other operations. Notes received in the machine may be recycled and dispensed to other users. Checks processed by the machine may be imaged by an imaging device, cancelled and stored in the machine or alternatively returned to a user.
摘要:
A “policy distribution point” (PDP) allows service drivers to be installed remotely and automatically without rebooting the PDP or otherwise interrupting existing network-based services. The exposure of sensitive configuration data to non-secure networks is minimized by placing PDPs close to the devices to be configured. Service drivers on the PDP can be reused to configure multiple devices of the same type. The PDP receives an “activation” and uses a service driver on the PDP to translate the activation into “device-specific instructions.” The device-specific instructions are sent to a device and configure the device to set up the network-based service. One or more PDPs can be used to configure both computing device and networking devices to provide a single service.
摘要:
A lure for attracting females of stored product moths comprising an cold hexane extract or a synthetic equivalent of an oily seed. The extract or equivalent comprises material such as single-chain or branched, saturated or unsaturated hydrocarbons, alcohols, aldehydes, and ketones. The extract includes extracts of nuts, chick starter and seeds. A method of attracting females of a population of stored product moths includes formulating a chemical extract of a material that is attractive to stored product moths into a lure. The extract or synthetic equivalent of an oily seed is formulated into a slow release device for use in attracting moths to a trap for monitoring or controlling populations of moths, for attracting moths to a killing station that is treated with a toxicant or pathogen for purposes of controlling populations of moths, and for confusing or disrupting moth behavior that results in controlling populations of moths.
摘要:
The present invention is a decorative interlayer, or a laminate obtained therefrom, wherein the aesthetic qualities can be matched to solid surface materials used in such applications as countertops, for example. The interlayers of the present invention comprise at least one composite filler material obtained from ground solid surface materials.
摘要:
A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors and measures the computer in operation. Once the isolated computing environment determines the computer is not in compliance with the required policies, the isolated computing environment may either impose an impediment to use such as slowing clock speed or completely disable the operating system. The user may have to return the computer to a service provider to restore it from the offending condition and reset the computer to an operational state.
摘要:
A computer is adapted for pay-for-use operation by adding a isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution of a validation program responsive to the clock or timer. The isolated computing environment may be protected from tampering by physical or cryptographic mechanisms, or both. The validation program measures or monitors for non-compliant states of the computer and may enforce sanctions when non-compliant states of the computer are detected.
摘要:
A method and system for configuring a new device are disclosed. The method includes using a host system to create a configuration file including data useable to configure the new device. A portable storage device is interfaced to the host and the configuration file is transferred to the storage device. The storage device is then interfaced to the new device and the configuration file is transferred to the new device. The configuration file is optionally used to configure the new device for communication over a network. A method for configuring the new device using a direct connection between the new device and a system bus of the host is also disclosed.
摘要:
An automated banking machine (10) includes a user interface (12) including an opening (20). Users of the machine deliver individual sheets and stacks of sheets to and from the machine through the opening. Stacks of sheets may include sheets such as notes, checks or other documents. Stacks input to the machine may include mixtures of various types of sheets. The machine operates to receive notes, process checks and perform other operations. Notes received in the machine may be recycled and dispensed to other users. Checks processed by the machine may be imaged by an imaging device, cancelled and stored in the machine or alternatively returned to a user. Documents produced by the machine such as receipts, checks or money orders as well as notes dispensed from the machine are assembled into a stack within the machine and delivered from the machine through the opening.
摘要:
A system and method automates and simplifies tasks associated with setting up a user self-activating network-based service. A configurable input engine is configured to define the service. The service may, for example, use a plurality of networking devices and/or computing devices. After the service is defined, an offer of the service is published to a user. The offer includes values of commercial terms and/or values of configuration parameters associated with the offer. Upon receiving an acceptance of the offer from the user, the configurable input engine automatically generates activations for the devices to be used by the service. The activations are sent to policy distribution points (PDPs) where the activations are translated into device-specific instructions. The device-specific instructions are in turn sent to the devices (networking devices and/or computing devices) to be configured. The device-specific instructions configure the devices, thereby automatically setting up the service for the user.