摘要:
A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.
摘要:
Methods to adapt a user interface view, provided by an integrated media/search web site via a global informational network, based on a user's lifestyle are disclosed. The methods include populating a user interface view of the integrated web site with a first set of links to the global informational network, wherein the integrated web site integrates a streaming digital media provider station with a global search engine. A user selects a link from the first set of links or performs a key word search using the global search engine. The user interface view is then re-populated with an updated set of links to the global informational network based on demographic and psychographic associations made by the global search engine in response to at least the most recently selected link, the most recent key word search, or the most recent streaming media content. If a new link or a new key word search is performed, the user interface view is again re-populated with an updated set of links. Also, if the streaming media program content from the provider changes, the user interface view is again re-populated with an updated set of links.
摘要:
An apparatus and method of copy protection for use in digital data recorders such as DVD-RAM recorders, which includes embedding transmission time information into a digital data stream by digital watermarking and comparing the transmission time with the current time at the data recorder (30, 50). If the time difference is less than a threshold value it is presumed that the recording is for time-shifting purposes, namely recording a programme to watch later, which is generally allowed by copyright laws. If the time difference is greater than a threshold value it is presumed that the recording is an attempted unauthorized recording such as from a pre-recorded copy, and further recording is prevented.
摘要:
An electrochemical detection system which specifically detects selected nucleic acid segments is described. The system utilizes biological probes such as nucleic acid or peptide nucleic acid probes which are complementary to and specifically hybridize with selected nucleic acid segments in order to generate a measurable current when an amperometric potential is applied. The electrochemical signal can be quantified.
摘要:
An apparatus and method of copy protection for use in digital data recorders such as DVD-RAM recorders, which includes embedding transmission time information into a digital data stream by digital watermarking and comparing the transmission time with the current time at the data recorder (30, 50). If the time difference is less than a threshold value it is presumed that the recording is for time-shifting purposes, namely recording a programme to watch later, which is generally allowed by copyright laws. If the time difference is greater than a threshold value it is presumed that the recording is an attempted unauthorised recording such as from a pre-recorded copy, and further recording is prevented.
摘要:
A new and distinct cultivar of Cleyera plant named ‘WMN-01’, characterized by its uniform and outwardly branching plant habit; vigorous growth habit; freely branching habit, dense and bushy appearance; glossy dark green, greyed green and light greenish yellow variegated leaves that are lightly blushed with purplish red under cool season conditions; and good garden performance, tolerant to full sunlight to shade conditions.
摘要:
Secure network location awareness is provided whereby a client is able to use appropriate settings when communicating with an access node of a communications network. In an embodiment a client receives a signed message from the access node, the signed message comprising at least a certificate chain having a public key. In some embodiments the certificate chain may be only a self-signed certificate and in other embodiments the certificate chain is two or more certificates in length. The client validates the certificate chain and verifies the signature of the signed message. If this is successful the client accesses stored settings for use with the access node. The stored settings are accessed at least using information about the public key. In another embodiment the signed message also comprises a location identifier which is, for example, a domain name system (DNS) suffix of the access node.
摘要:
Disclosed is an authentication mechanism that enables an information recipient to ascertain that the information comes from the sender it purports to be from. This mechanism integrates a private/public key pair with selection by the sender of a portion of its address. The sender derives its address from its public key, for example, by using a hash of the key. The recipient verifies the association between the address and the sender's private key. The recipient may retrieve the key from an insecure resource and know that it has the correct key because only that key can produce the sender's address in the message. The hash may be made larger than the sender-selectable portion of the address. The recipient may cache public key/address pairs and use the cache to detect brute force attacks and to survive denial of service attacks. The mechanism may be used to optimize security negotiation algorithms.
摘要:
Dynamic host configuration protocol (DHCP) is extended in order to assist with secure network location awareness. In an embodiment a DHCP client receives a signed DHCP response message from a DHCP server, the signed message comprising at least a certificate chain having a public key. In that embodiment the DHCP client validates the certificate chain and verifies the signature of the signed message. If this is successful the DHCP client accesses stored settings for use with the server. The stored settings are accessed at least using information about the public key. In some embodiments signed DHCPOFFER messages and signed DHCPACK messages are used. In another embodiment the signed DHCP message comprises a location identifier which is, for example, a domain name system (DNS) suffix of a DHCP server.