Method and apparatus for off-gas composition sensing
    4.
    发明授权
    Method and apparatus for off-gas composition sensing 失效
    废气成分检测方法和装置

    公开(公告)号:US5984998A

    公开(公告)日:1999-11-16

    申请号:US970826

    申请日:1997-11-14

    IPC分类号: G01N21/31 G01N21/39 C21C1/04

    CPC分类号: G01N21/39 G01N21/31

    摘要: An apparatus and method for non-intrusive collection of off-gas data in a steelmaking furnace includes structure and steps for transmitting a laser beam through the off-gas produced by a steelmaking furnace, for controlling the transmitting to repeatedly scan the laser beam through a plurality of wavelengths in its tuning range, and for detecting the laser beam transmitted through the off-gas and converting the detected laser beam to an electrical signal. The electrical signal is processed to determine characteristics of the off-gas that are used to analyze and/or control the steelmaking process.

    摘要翻译: 用于在炼钢炉中非侵入性收集废气数据的装置和方法包括用于将激光束通过炼钢炉产生的废气传送的结构和步骤,用于控制透射以重复地扫描激光束通过 在其调谐范围内具有多个波长,并且用于检测通过废气传输的激光束并将检测的激光束转换成电信号。 处理电信号以确定用于分析和/或控制炼钢过程的废气的特性。

    Systems and methods for enterprise security with collaborative peer to peer architecture
    8.
    发明授权
    Systems and methods for enterprise security with collaborative peer to peer architecture 有权
    用于企业安全的系统和方法,具有协作对等体系结构

    公开(公告)号:US08239917B2

    公开(公告)日:2012-08-07

    申请号:US11928256

    申请日:2007-10-30

    摘要: Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy. The critical components are monitored to identify critical components that differ from the critical components of the snapshot. If differing critical components are detected, the device is restored to conform with system policy by replacing differing critical components based upon the snapshot.

    摘要翻译: 系统和方法通过企业策略认证设备在企业系统内运行。 安装在设备上的代理分析设备以确定设备的配置文件信息。 所确定的简档信息被发送到类型2超级对等体,其验证简档信息是否符合企业策略。 如果配置文件信息符合企业策略,则根据配置文件信息,在类型2超级对等体中为代理生成代理信任凭证,并发给代理。 基于代理信任凭证验证设备的真实性。 如果设备被认证,则允许与设备进行通信。 如果设备未通过认证,则会阻止与设备的通信。 在另一个实施例中,方法恢复设备以符合系统策略。 设备的关键组件的快照是在设备符合系统策略的情况下进行的。 监视关键组件以识别与快照的关键组件不同的关键组件。 如果检测到不同的关键组件,则通过基于快照替换不同的关键组件来恢复设备以符合系统策略。

    Systems And Methods For Enterprise Security With Collaborative Peer To Peer Architecture
    9.
    发明申请
    Systems And Methods For Enterprise Security With Collaborative Peer To Peer Architecture 有权
    企业安全的系统和方法与协同对等体架构

    公开(公告)号:US20080307488A1

    公开(公告)日:2008-12-11

    申请号:US11928256

    申请日:2007-10-30

    IPC分类号: G06F21/00

    摘要: Systems and methods authenticate a device to operate within an enterprise system with an enterprise policy. An agent, installed on the device, analyzes the device to determine profile information of the device. The determined profile information is sent to a type 2 super peer that verifies whether the profile information conforms to the enterprise policy. If the profile information conforms to the enterprise policy, an agent trust credential is generated, within the type 2 super peer, for the agent, based upon the profile information, and issued to the agent. Authenticity of the device is verified based upon the agent trust credential. If the device is authenticated, communications with the device are permitted. If the device is not authenticated, communications with the device is prevented. In another embodiment, a method restores a device to conform to a system policy. A snapshot of critical components of the device is taken while the device is in compliance with the system policy. The critical components are monitored to identify critical components that differ from the critical components of the snapshot. If differing critical components are detected, the device is restored to conform with system policy by replacing differing critical components based upon the snapshot.

    摘要翻译: 系统和方法通过企业策略认证设备在企业系统内运行。 安装在设备上的代理分析设备以确定设备的配置文件信息。 所确定的简档信息被发送到类型2超级对等体,其验证简档信息是否符合企业策略。 如果配置文件信息符合企业策略,则根据配置文件信息,在类型2超级对等体中为代理生成代理信任凭证,并发给代理。 基于代理信任凭证验证设备的真实性。 如果设备被认证,则允许与设备进行通信。 如果设备未通过认证,则会阻止与设备的通信。 在另一个实施例中,方法恢复设备以符合系统策略。 设备的关键组件的快照是在设备符合系统策略的情况下进行的。 监视关键组件以识别与快照的关键组件不同的关键组件。 如果检测到不同的关键组件,则通过基于快照替换不同的关键组件来恢复设备以符合系统策略。