摘要:
A method and system for private shipping to anonymous users purchasing goods on a computer or communications network linking users with merchant web-sites for electronic commerce. In a preferred embodiment, a user is issued a proxy identity and the user's mailing address is received and encrypted. The proxy identity and encrypted mailing address are transmitted to a merchant, and decryption information is provided to a shipper. Upon receipt of the encrypted shipping address from the merchant, the shipper can use the decryption information to decrypt the address and generate a package label bearing the true shipping address of the user so that the merchant is prevented from electronically capturing the true identity of the user. The present invention provides for anonymity of a user when browsing and shopping, and integrates easily and simply with existing online infrastructures of banks or credit card issuers, and delivery companies.
摘要:
An ergonomic arm support system maintains a neutral position for the forearm. A mechanical support structure attached to a chair or other mounting structure supports the arms of a sitting or standing person. The system includes moving elements and tensioning elements to provide a dynamic balancing force against the forearms. The support structure is not fixed or locked in a rigid position, but is an active dynamic system that is maintained in equipoise by the continuous operation of the opposing forces. The support structure includes an armrest connected to a flexible linkage or articulated or pivoting assembly, which includes a tensioning element such as a spring. The pivoting assembly moves up and down, with the tensioning element providing the upward force that balances the downward force of the arm.
摘要:
Monitoring integrity of a running computer system is based on creating a Test Model which includes predicates descriptive of invariant properties of security relevant objects and their attributes in the monitored structure known-to-be “healthy”, acquiring memory image of a portion of the running monitored structure, decomposing the acquired memory image to retrieve representation of the security relevant objects of interest, by implementing the attributes of the Test Model, and verifying, by implementing the predicates, whether the invariant properties defined in the Test Model remain unchanged for the running host system. If a discrepancy is detected, a signal indicative of a detected discrepancy is transmitted to a management entity for analysis and formulating a course of action.
摘要:
a cup assembly includes a cup and a removable cooler block. The cup includes a base and a circumferential wall to commonly define a space for containing the liquid wherein at least one of the cooler block and the base is equipped with a magnet and the other with either the magnetic attraction part or another magnet. The cooler block includes material of the high specific heat and/or of the high thermal conductivity.
摘要:
A cellular phone includes a case defining opposite primary faces with the display on one of the primary faces. A camera lens is located around a front edge area of the case so as to be activated to efficiently capture the front sight image when the cellular phone is held in the palm of the user in a lying manner and the user is moving wherein the contents derived from the Internet communication and the front sight image are both shown on the screen in either an overlapped manner or not and an optional translucent background layer may be provided as an interface with regard to the front sight image so as to have both the contents and the front sight image viewable on the screen.
摘要:
A network-based storage system comprises one or more block-level storage servers that connect to, and provide disk storage for, one or more host computers (“hosts”) over logical network connections (preferably TCP/IP sockets). In one embodiment, each host can maintain one or more socket connections to each storage server, over which multiple I/O operations may be performed concurrently in a non-blocking manner. The physical storage of a storage server may optionally be divided into multiple partitions, each of which may be independently assigned to a particular host or to a group of hosts. When a host initially connects to a storage server in one embodiment, the storage server initially authenticates the host, and then notifies the host of the ports that may be used to establish data connections and of the partitions assigned to that host.