摘要:
FIG. 1 is a front, top and right side perspective view of a wristband, showing my new design; FIG. 2 is a front view thereof; FIG. 3 is a rear view thereof; FIG. 4 is a left side view thereof; FIG. 5 is a right side view thereof; FIG. 6 is a top view thereof; and, FIG. 7 is a bottom view thereof. The broken lines in the drawings illustrate the portions of the wristband and form no part of the claimed design. The other broken lines in FIGS. 1 and 2, showing a graphic, represent environmental subject matter only and form no part of the claimed design.
摘要:
A threaded fastener includes a head, a shank extending from the head, and a. cone portion. The head includes a top portion and an annular side wall extending downwardly from a periphery of the top portion. The cone portion is formed between the shank and the top portion and has a peripheral surface tapering from the top portion to the shank. An annular groove is created between the annular side wall and the cone portion for development of an accommodating space with an opening downward in a bottom of the head. The annular groove is surrounded by an inner surface of the annular side wall, the peripheral surface of the cone portion, and a bottom wall of the top portion connected between the annular side wall and the cone portion.
摘要:
A wood screw is disclosed herein. It comprises a screw head and a rod body integrally extended from the screw head and having a shank part and a screwing part, wherein the screwing part comprises a straight surface surrounded with a threaded section and a cutting section on which a cutting unit is formed, and wherein a root diameter of the shank part is larger than root diameters of the threaded section and the cutting section respectively, and larger than or equal to a maximum outer diameter of the cutting section defined by the cutting unit.
摘要:
A method, a system, and a computer program product embodying computer readable code for configuring a rule file for a Web application firewall. The method includes: blocking a response created by a Web application; modifying the response by adding capturing code for capturing a regular expression and an associated parameter value embedded in the response while being executed; sending the modified response to the browser; receiving a request submitted by the browser and at least one regular expression and an associated parameter value captured by the capturing code; determining a parameter name and a regular expression associated with the same parameter value, and configuring the rule file of the firewall by use of the determined parameter name and regular expression associated with one another as a filtering rule.
摘要:
Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent module; a template generator for randomly selecting one template from said template repository and generating a new agent module according to the selected template; and a transceiver for sending said new agent module to an external apparatus communicating with said secure apparatus to update a current agent module which is running in said external apparatus, wherein said current agent module is used to verify the integrity of said software system running in said external apparatus. The secure apparatus can protect software in an insecure environment with a high software protection level to prevent the software from being tampered or bypassed.
摘要:
Methods and apparatuses for secure communications of confidential information are provided. In an embodiment, a method of communicating with a population of radio frequency identification tags includes transmitting a first interrogation signal, receiving a response to the first interrogation signal from at least one RFID tag at a first received signal strength including at least a portion of a first identification code, and transmitting a second interrogation signal that includes a request for confidential information, a command to transmit a response to the second interrogation signal at a secure power level, and the first identification code. In another embodiment, a method for communicating with an RFID tag includes receiving an interrogation signal that includes a request for confidential information and transmitting a response to the interrogation signal at a secure power level. The response includes the confidential information.
摘要:
A pixel structure having an SMII (semiconductor-metal-insulator-ITO) capacitor is provided. Specifically, a partial region of a transparent electrode layer corresponding to a semiconductor layer is removed, so as to eliminate parasitic capacitance between the transparent electrode layer and the semiconductor layer, prevent defects (e.g., waterfall, image sticking, etc.) from occurring on the display frame, and improve the display quality.
摘要:
A detection system for detecting appearances of many electronic elements includes a rotary module, a feeding module and a detection module. The rotary module has a base structure and a hollow transparent rotary structure disposed on the base structure. The feeding module is disposed beside one side of the hollow transparent rotary structure in order to sequentially guide the electronic elements to the top surface of the hollow transparent rotary structure. The detection module has a plurality of detection units sequentially disposed around the hollow transparent rotary structure. Each detection unit is composed of an image-sensing element for sensing the electronic elements, an image-capturing element for capturing surface images of the electronic elements and a classifying element for classifying the electronic elements.
摘要:
A system for correcting quality problems includes a server (1), a database (2), and a plurality of client terminals (4) connected to the server through a network (3). The database stores data used or generated in utilizing the system. Each client terminal provides an interactive user interface for quality control operators to perform corrective actions. The server comprises: a data receiving module (12) for receiving confirmations and responses from the client terminals through the network; a data transmitting module (13) for transmitting initial corrective action reports generated by the server to corresponding client terminals, for operators located at the client terminals to reply to the initial corrective action reports; and a CAR (corrective action report) generating module (14) for integrating all data received by the data receiving module and automatically generating formal corrective action reports. A related method for correcting quality problems is also disclosed.
摘要:
The present invention provides methods for purifying insoluble bone gelatin and uses for insoluble bone gelatin. The process for isolating insoluble bone gelatin from bone tissue includes grinding the bone tissue into bone powder; washing the bone powder with saline; demineralizing the bone tissue; contacting the bone powder with a neutral salt; and contacting the bone powder with a stabilizer. The present invention also discloses an insoluble bone gelatin including about 10 percent growth factor. Insoluble bone gelatin is useful, for example, in preparing impaction bone grafts.