摘要:
A lock is described which has the capability to generate or encrypt a close number which is then displayed to the operator of the lock to be used to verify the locking of the lock. This number must be reported to a central dispatch operation where it is compared with a number similarly generated using identical starting values and an identical encryption algorithm. Comparison of the two numbers, resulting in a compare equal will indicate that the lock has been locked since the lock encryption operation is dependent upon the repowering of the lock. The lock is repowered after it has been opened by rotation of the dial which will extend the bolt and through the rotation of the dial drive a stepper motor/generator to provide electrical power to the lock.
摘要:
A distraction device is comprised of a hollow container that is divided into a first chamber and a second chamber. An explosive charge capable of producing a loud sound and a brilliant flash of light fills the second chamber. A standard M201 hand grenade fuse is installed in the distraction device so that the fuse is in communication with the first chamber. The fuse initiates the sequential ignition of several combustible compositions in the distraction device. A first combustible composition generates a combustion gas of sufficient pressure in the first chamber to separate the expended fuse from the distraction device before the device explodes. The first composition also ignites a combustible time-delay composition, which in turn ignites a spark-producing composition that detonates an explosive output charge. Separation of the fuse from the distraction device before the explosive charge is detonated prevents the fuse from becoming a lethal projectile. The distraction device is useful in law enforcement and military encounters for distracting and temporarily disorienting a suspect or enemy.
摘要:
A microcomputer of a household appliance, such as a microwave oven, receives input data from the user for operating the various functions of the appliance. The data is stored in the volatile memory of the microcomputer. The data is compressed into a bit pattern which is representative of all the bits in the volatile memory in the event of a power interruption. The compressed bit pattern is stored in the volatile memory of the microcomputer to be later verified. The operations of the microcomputer is continued for those functions which do not affect volatile memory until the power source is restored or the microcomputer is reset. In either case the volatile memory is verified by generating a compressed bit pattern for current data. The current bit pattern is then compared to an initial bit pattern. If the bit patterns are identical then the volatile memory has not been corrupted by an interruption of power exceeding a preselected "data vaild time". Also the fixed bit pattern is verified against a fixed bit pattern in nonvolatile memory to determine if any corrpution has occurred. If no corruption has occurred the normal operations continue. If it has been determined that the volatile memory has been corrupted, then the microcomputer is reinitialized with default data copies from nonvolatile memory to volatile memory.