摘要:
Reader (420) for determining the validity of a connection to a transponder (440), designed to measure a response time of a transponder (440) and to authenticate the transponder (440) in two separate steps. Transponder (440) for determining the validity of a connection to a reader (420), wherein the transponder (440) is designed to provide information for response time measurement to said reader (420) and to provide information for authentication to said reader (420) in two separate steps, wherein at least a part of data used for the authentication is included in a communication message transmitted between the reader (420) and the transponder (440) during the measuring of the response time.
摘要:
Data security is facilitated. In accordance with one or more embodiments, a target circuit is used to generate encryption information specific to the target circuit. The encryption information is used for generating data corresponding to a key, such as for decrypting media content. In some implementations, encryption information is used together with key data to generate a key offset. The key offset is subsequently used, together with newly-generated encryption information, to obtain the key.
摘要:
The invention provides devices and methods for increasing the degree of mixing of fluids, including under conditions of laminar flow and turbulent flow. In one embodiment, mixing of fluids using the invention's devices and methods is increased by splitting the flow of at least one of the fluids into two or more inlet channels. This is optionally followed by further splitting and merging (e.g., using one or more split and merge (SAM) mixer) the fluids.
摘要:
A method for generating a secure acknowledgment message that involves constructing a plaintext of the acknowledgment message, computing a cyclic redundancy check (CRC) value for the plaintext of the acknowledgment message, encrypting the plaintext of the acknowledgment message to obtain a ciphertext of the acknowledgment message, computing a secure check (CHK) value from the ciphertext using bits of the cyclic redundancy check value (CRC) and then appending the secure check value (CHK) to the plaintext of the acknowledgment message.
摘要:
In the field of cryptography there is a need to reduce the time taken to cryptographically transform data text while maintaining the low memory requirements associated with conventional square-and-multiply modular exponentiation.A method of cryptographically transforming data text c comprises the step of generating an integer representation m of the data text c according to m=cd where d is a predetermined exponent. The step of generating the integer representation m includes generating a sequence of intermediate numbers, each intermediate number being based on two or fewer earlier numbers in the sequence. Generating a sequence of intermediate numbers includes retrieving a pre-stored instruction to determine which two or fewer earlier numbers in the sequence a given intermediate number is based on and the functional manipulation of the or each earlier number required to generate the given intermediate number.
摘要:
In a method for generating a cipher-based message authentication code, a state array (25) comprised of rows (31-34) of bytes (S′0-S′15) and columns (41-44) of bytes (S′0-S′15) based on a message to be transmitted is generated. The cipher-based message authentication code is generated by retaining the bytes (29, 30) of at least one row (32, 34) of the state array (25).
摘要:
A system and method of detecting undesired email containing image-based messages employs a statistical analysis process which identifies and assigns probability values to the presence of each of a pre-selected set of text-related characteristics of an email under consideration and to the presence of each of a pre-selected set of image-related characteristics of the email under consideration. The identified characteristics and their associated probability values are used to determine whether the email is undesired. In one embodiment, the identification and assignment of probability values is a Bayesian analysis and, preferably, a Statistical Token Analysis. The system and method can identify undesired emails which contain images having messages, generally in the form of text in the image.
摘要:
An email system comprises a plurality of email servers connected by a data communications network. The email system avoids single points of failure by employing multiple email servers which self configure, without requiring dedicated servers, through self addressing and discovery and announcement protocols. An email server can act as a primary email server by executing an administration tool allowing an administrator to modify the configuration data set which the email servers utilize, and the primary email server will then announce the resulting change in the version level of the configuration data set to other email servers. Each email server will then determine and request any needed updates to its respective configuration data set from the primary email server or another email server. The resulting email system is: robust, avoiding single points of failure; scalable, as additional email processing capacity can be achieved by adding additional email servers; and is simple to administer as changes to the configuration data set can be made at any email server with a copy of the appropriate administration tool and such changes automatically propagate through the email system.
摘要:
The administration of gaseous nitric oxide as a biocidal moiety is proffered as a de novo treatment in the control and eradication of biofilms. The present invention relates to the use or methods of application of exogenous nitric oxide gas (gNO) as a stand alone biocidal agent or in cohort with any or all adjunct vehicles in the control of biofilms generated by microbial organisms, i.e., bacteria, protozoa, amoeba, fungi etc. Further, the present invention introduces the concept of utilization and methods of application of gaseous nitric oxide in control and eradication of biofilm forming microorganisms. Noteworthy areas of application are offered as examples. They include, and are not limited to, air and/or water heating/cooling distribution systems in facilities such as hospitals and laboratories, surfaces of medical devices, household surfaces, dental plaque, dental and/or medical water treatment lines, industrial pipelines, water treatment and distribution facilities and fluids sterilization. Various specialized delivery apparatus will be designed to facilitate nitric oxide gas administration to each specific unique application.
摘要:
A clamp for an oil well line is disclosed, the clamp having a casing, typically a pair of wedge members defining a line receiving recess between them and wherein the wedge member are movable within a channel in the casing to move together and grip the line when axial force is applied to the line. The radially outermost faces of the wedge members are typically shaped to match the taper of the channel in the casing, and so are pressed together as they move axially down the tapered channel. One wall of the channel is typically movable to disengage from the wedge member when the gripping force is to be removed. The line-receiving recess can be in the form of an arc or a dog leg, and can be lined with a high friction material or a softer material to minimize damage to the line by the clamping force.