摘要:
Disclosed is an improved reel assembly for use in conjunction with an occupant restraint system. The assembly employs a dual locking arrangement whereby an occupant can be restrained during both major and minor incidents. After a major incident, the reel assembly remains locked until the occupant disengages the reel via a push button. After a minor incident, the reel assembly can be conveniently unlocked, without the need for accessing the push button, by applying counter tension to the webbing.
摘要:
A method and system for providing remote user access to secure financial applications by deployment of SSO software (126) to client workstations (120), including receiving a password for collaborating access to a secure server (110); navigating to the secure server (110) using a web browser (124) on a remote workstation (120); providing user authorization details and the received password to the secure server (120); generating a subsequent password at the secure server (110) upon validation of the user authorization details and received password; downloading an SSO deployment file (122) to the remote workstation (120), said deployment file (122) including the subsequent password; executing the SSO deployment file (122) to install an SSO client application (126) on the remote workstation; reading workstation settings and user credentials from a secure file or data store; and running the SSO client application (126) on the workstation to employ the user credentials and subsequent password to logon to the secure application.
摘要:
A strong authentication method and system using a Secure ICC component coupled with a Personal device, and relying on the existing cryptographic protocols and keys for managing the secure ICC to generate One-Time-Passwords when the necessary authentication keys or cryptographic protocols are not already present in the Secure ICC configuration for that purpose.
摘要:
Disclosed is a method for detecting a latent fingerprint image provided to a biometric input device of a fingerprint based security system. First and second images of the fingerprint are captured during a time period interval Δt. At least one of the first and second images are analyzed to identify an extractable feature within a global reference frame, the extractable feature usable for authenticating an individual. The first and second images are compared one with the other to determine differences indicative of motion about the identified extractable feature within a local reference frame during the time period interval Δt. Absent motion about the identified extractable feature being detected, the fingerprint is registered as a latent fingerprint and cannot be used to authenticate the individual who is seeking authorization.
摘要:
A cooling water pump for internal combustion engine includes a base and an outer cover forming a water input chamber, an impeller supported on a shaft within said chamber, fed shaft includes a bearing/seal unit mounted within the base and the shaft extended outwardly for connection to the engine. A one-piece, fully enclosed and double shrouded impeller is secured to the shaft. Impeller has a central hub with an outer peripheral concave surface, a bottom convex end wall, vanes are secured to the central portion of the concave wall in the bottom wall and project outwardly therefrom with an outer top shroud. The base has a recess within which the bearing/seal unit is mounted. The recess extends outwardly beyond the outer edge convex wall of the hub from a cooling chamber. The vanes direct a portion of the water flowing through the passageway into the recess for cooling purposes and then back into the radially outer portion of the passageway for discharge with the flowing water into the outlet passageway. The radially inner end of the shroud and outer convex wall overlap each other to form a controlled entrance into the outlet passageway to divert part of the flow into the recess. The invention pertains to a cooling water pump for an internal combustion engine. The pump has a base and a cover that form a water chamber. The chamber includes a one-piece, shrouded impeller secured to a drive shaft driven by the engine. The impeller has a central hub with vanes that project outwardly along with its integral shroud to form a flow passageway to a discharge opening. The base has a recess within which a bearing/seal unit is mounted. The recess extends outwardly beyond the hub to form a cooling passageway to the recess. A portion of the water flowing through the flow passageway is directed into the recess to cool the seal unit, and then back to the flow passageway for discharge. The shroud and hub can overlap to help control the flow to the recess.
摘要:
A method and apparatus for authenticating a user In dependence upon biometric Input information is disclosed. According to the method when a user is identified, their biometric information or data derived therefrom is automatically stored. The data is then used in subsequent user identification attempts as a template. The original templates are not replaced but those templates that are automatically stored are replaced at intervals.
摘要:
An improved method of encoding data within directory files on an integrated circuit IC) smart card is shown. Advantageously the improved method no longer imposes a limitation in placing the pointer data start address prior to encoding of data, since after encoding a single continuous block of unused memory within the directory file results, enables encoding applications to make better use of this memory space thereby eliminating the deficiency of having two non-sequential empty memory blocks as provided by prior art systems.
摘要:
A cooling water pump for internal combustion engine includes a base and an outer cover forming a water input chamber, an impeller supported on a shaft within said chamber, fed shaft includes a bearing/seal unit mounted within the base and the shaft extended outwardly for connection to the engine. A one-piece, fully enclosed and double shrouded impeller is secured to the shaft. Impeller has a central hub with an outer peripheral concave surface, a bottom convex end wall, vanes are secured to the central portion of the concave wall in the bottom wall and project outwardly therefrom with an outer top shroud. The base has a recess within which the bearing/seal unit is mounted. The recess extends outwardly beyond the outer edge convex wall of the hub from a cooling chamber. The vanes direct a portion of the water flowing through the passageway into the recess for cooling purposes and then back into the radially outer portion of the passageway for discharge with the flowing water into the outlet passageway. The radially inner end of the shroud and outer convex wall overlap each other to form a controlled entrance into the outlet passageway to divert part of the flow into the recess.
摘要:
A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.
摘要:
A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.