Accessing Android Media Resources from Sony Dash
    1.
    发明申请
    Accessing Android Media Resources from Sony Dash 审中-公开
    从Sony Dash访问Android媒体资源

    公开(公告)号:US20120117184A1

    公开(公告)日:2012-05-10

    申请号:US13100448

    申请日:2011-05-04

    IPC分类号: G06F15/16

    摘要: A process of accessing media resources on Android capable wireless devices running an i-jetty HTTP server from a personal Internet interface device such as the Sony Dash. Activating a servlet on the Android device to transmit an IP address to a Dash capable device and establishing a wireless communication connection from the Dash device to the Android device using the IP address. Operating a service on the Dash device that accesses multimedia resources on the Android device where the Android device dynamically generates multimedia metadata for extraction and display on the Dash device. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.

    摘要翻译: 访问Android的无线设备上的媒体资源的过程,该设备通过个人互联网接口设备(如Sony Dash)运行i-jetty HTTP服务器。 激活Android设备上的一个servlet,将IP地址传输给具有Dash功能的设备,并使用IP地址建立从Dash设备到Android设备的无线通信连接。 在Dash设备上运行服务,可以在Android设备上访问多媒体资源,Android设备会动态生成多媒体元数据,以便在Dash设备上进行提取和显示。 该摘要不被认为是限制性的,因为其他实施例可能偏离本摘要中描述的特征。

    Lockbox for mitigating same origin policy failures
    2.
    发明授权
    Lockbox for mitigating same origin policy failures 有权
    Lockbox用于减轻相同的原始策略失败

    公开(公告)号:US08782797B2

    公开(公告)日:2014-07-15

    申请号:US12175264

    申请日:2008-07-17

    IPC分类号: G06F7/04

    CPC分类号: G06F21/55 H04L63/1416

    摘要: Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy.

    摘要翻译: 提供了管理在计算环境中发生的相同来源策略(SOP)故障的系统和方法。 在说明性实现中,示例性计算环境包括锁箱模块,以及指令集,其包括指示锁箱模块处理数据和/或计算代表所选择的操作/特征的应用执行命令的至少一个指令,以及根据 一个选定的SOP管理模式。 在说明性实现中,SOP管理范例包括部署“锁箱”计算应用元件的一个或多个指令,允许管理,监视和控制可在相同原始策略下操作的计算应用特征/操作。

    Wastewater processing method of hydrolysis-acidification enhanced by addition of zero-valent iron (ZVI)
    3.
    发明授权
    Wastewater processing method of hydrolysis-acidification enhanced by addition of zero-valent iron (ZVI) 有权
    通过添加零价铁(ZVI)增强水解酸化的污水处理方法

    公开(公告)号:US08758617B2

    公开(公告)日:2014-06-24

    申请号:US13981887

    申请日:2011-09-21

    IPC分类号: C02F3/30 C02F3/28

    摘要: The invention discloses a wastewater processing method of hydrolysis-acidification enhanced by addition of zero-valent iron (ZVI), including the following steps: 3˜6 ZVI-filling layers are settled in the middle of an anaerobic hydrolysis-acidification reactor. Excess sludge taken from sewage treatment plant using as seed sludge is added into this anaerobic hydrolysis-acidification reactor for startup and domestication. In the present invention, ZVI are added into this anaerobic hydrolysis-acidification reactor to accelerate organic matters degradation and produce more acetic acids, accompanied with higher COD removal obtained. ZVI can be protected from rust in this anaerobic biological environment due to the air isolation. Also, ZVI can enhance anaerobic hydrolysis of wastewater through reducing refractory pollutants involved in wastewaters. This novel method made the effluent from the hydrolysis-acidification reactor present less COD concentration and simpler substrate form, benefiting for the following anaerobic methanogenesis or aerobic treatment.

    摘要翻译: 本发明公开了通过添加零价铁(ZVI)提高水解酸化的废水处理方法,包括以下步骤:3〜6个ZVI填充层沉淀在厌氧水解酸化反应器的中间。 将用作种子污泥的污水处理厂取得的多余污泥加入到厌氧水解酸化反应器中进行启动和驯化。 在本发明中,将ZVI加入到该厌氧水解酸化反应器中以加速有机物降​​解并产生更多的乙酸,伴随着更高的COD去除。 由于空气隔离,ZVI可以在这种厌氧生物环境中防止生锈。 此外,ZVI可以通过减少废水中的难溶性污染物来增强废水的厌氧水解。 这种新方法使得水解酸化反应器的流出物具有更少的COD浓度和更简单的底物形式,有利于以下厌氧甲烷生成或需氧处理。

    Zero-valent iron two-phase anaerobic reactor
    4.
    发明授权
    Zero-valent iron two-phase anaerobic reactor 有权
    零价铁两相厌氧反应器

    公开(公告)号:US08758616B2

    公开(公告)日:2014-06-24

    申请号:US13981884

    申请日:2011-09-21

    IPC分类号: C02F3/00

    摘要: The invention, belongs to the field of wastewater treatment technology, is a two-phase anaerobic reactor enhanced by addition of zero valent iron (ZVI). In the reactor, 2˜4 ZVI-filling layers are settled in the middle of the anaerobic hydrolysis-acidification tank, the effluent of which is fed into the rear anaerobic methanogenic tank. The degradation of organics is effectively enhanced in the anaerobic hydrolysis-acidification tank with dosing of ZVI, which may produce more acetic acid that is a desired substrate for the subsequent methanogenesis. Meanwhile, the acidic environment of the hydrolysis-acidification tank is helpful for the dissolution of ZVI to maintain its activity. The reactor is reasonably designed with high performance and strong shock resistance in anaerobic treatment of various wastewaters. Tests in lab-scale showed that hydrolysis-acidification and methanogenesis in this combined system were significantly improved compared with a reference reactor without addition of ZVI.

    摘要翻译: 本发明属于废水处理技术领域,是通过添加零价铁(ZVI)增强的两相厌氧反应器。 在反应器中,将2〜4个ZVI填充层沉淀在厌氧水解酸化槽的中间,其排出物进料到后厌氧甲烷生成槽中。 在ZVI给药的厌氧水解酸化槽中有机物的降解被有效地增强,这可以产生更多的乙酸,其是用于随后的甲烷生成的期望的底物。 同时,水解酸化槽的酸性环境有助于溶解ZVI以维持其活性。 在各种废水的厌氧处理中,反应器设计合理,性能好,抗冲击性强。 实验室测试结果表明,与没有添加ZVI的参比反应器相比,该组合体系中的水解酸化和甲烷生成显着改善。

    Tubular cracking furnace
    5.
    发明授权
    Tubular cracking furnace 有权
    管式裂解炉

    公开(公告)号:US08585890B2

    公开(公告)日:2013-11-19

    申请号:US12593216

    申请日:2008-03-28

    IPC分类号: C10G9/14 B01J8/00

    摘要: This invention relates to a tubular cracking furnace, especially an ethylene cracking furnace, which comprises a convection section and a or dual radiant section(s), at least one heat transfer intensifying member arranged in at least one pass each radiant tube in said radiant section, said at least one heat transfer intensifying member comprises a first heat transfer intensifying member, which is arranged at a location between 10D and 25D upstream of the extreme point of said at least one pass radiant tube metal temperature, wherein D is the inner diameter of the radiant tube having heat transfer intensifying members. The present invention could achieve the best enhanced heat transfer result with given number of heat transfer intensifying member, by optimizing the locations of heat transfer intensifying members in the radiant tube.

    摘要翻译: 本发明涉及一种管状裂解炉,特别是一种乙烯裂解炉,其包括一个对流段和一个或两个辐射区,至少一个传热增强构件,其布置在至少一个通路中,每个辐射管中的每个辐射管 所述至少一个传热增强构件包括第一传热增强构件,其布置在所述至少一个通过辐射管金属温度的极限点上游的10D和25D之间的位置,其中D是 辐射管具有传热增强构件。 通过优化辐射管中的传热增强构件的位置,本发明可以通过给定数量的传热增强构件实现最佳的增强的传热结果。

    Identifying dependencies of an application upon a given security context
    6.
    发明授权
    Identifying dependencies of an application upon a given security context 有权
    识别应用程序在给定安全上下文中的依赖关系

    公开(公告)号:US07784101B2

    公开(公告)日:2010-08-24

    申请号:US11214123

    申请日:2005-08-29

    IPC分类号: G06F21/00 G06F17/30

    CPC分类号: G06F21/6218 G06F2221/2101

    摘要: A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.

    摘要翻译: 用于在给定的安全上下文中识别应用的依赖性的技术包括监视应用产生的安全检查。 识别需要提升权限的安全检查,并且可能会记录与识别的安全检查对应的应用程序的执行状态。 可以通过监视访问检查,监视特权检查,针对与提升的权限相关联的已知标识符的列表等来检查用户/组标识符来识别需要提高权限的安全检查。

    Method for insulating electrical machine
    7.
    发明授权
    Method for insulating electrical machine 失效
    电机绝缘方法

    公开(公告)号:US07694409B2

    公开(公告)日:2010-04-13

    申请号:US11869444

    申请日:2007-10-09

    申请人: Rihong Mo Shuo Chen

    发明人: Rihong Mo Shuo Chen

    IPC分类号: H02K15/10

    摘要: A method of insulating a coil of an electrical machine includes applying an insulating varnish to a coil of conductive wire. The varnish includes (i) a resin; (ii) a first catalyst having a first activation temperature, the first catalyst being active at room temperature; and (iii) a second catalyst with a second activation temperature substantially higher than the first activation temperature. The varnish is allowed to partially cure at room temperature. The coil is mounted to a yoke to form a rotor of the electrical machine. The rotor is operated so as to heat the coil and activate the second catalyst to complete curing of the varnish.

    摘要翻译: 一种电机线圈绝缘方法包括将绝缘漆施加到导线线圈上。 清漆包括(i)树脂; (ii)具有第一活化温度的第一催化剂,所述第一催化剂在室温下是活性的; 和(iii)具有显着高于第一活化温度的第二活化温度的第二催化剂。 使清漆在室温下部分固化。 线圈安装到轭架上以形成电机的转子。 操作转子以加热线圈并激活第二催化剂以完成清漆的固化。

    Intelligent locking device, removable HDD receiving system with the same and method for preventing the removable HDD from being wrongly ejected therefrom
    8.
    发明授权
    Intelligent locking device, removable HDD receiving system with the same and method for preventing the removable HDD from being wrongly ejected therefrom 有权
    智能锁定装置,具有相同的可移动HDD接收系统以及用于防止可移动HDD被错误地从其中弹出的方法

    公开(公告)号:US07636237B2

    公开(公告)日:2009-12-22

    申请号:US11905503

    申请日:2007-10-01

    IPC分类号: G06F1/16

    摘要: An intelligent locking device comprises a microprocessor, a locking element and a control button electrically connected to the microprocessor respectively. The locking element locks a removable HDD to a computer. The control button generates trigger signals in response to manual push thereon. When receiving the trigger signal, the microprocessor detects whether there is data transferring between the removable HDD and the computer, if there is data transferring, the microprocessor terminates data transferring and then sends a driving signal to the locking element; if not, the microprocessor directly sends a driving signal to the locking element. When receiving the driving signal, the locking element releases the lock between the removable HDD and the computer to permit the removable HDD to be safely ejected. Meanwhile, a removable HDD receiving system with the locking device and a method for preventing the removable HDD from being wrongly ejected from the receiving system are disclosed.

    摘要翻译: 智能锁定装置包括分别与微处理器电连接的微处理器,锁定元件和控制按钮。 锁定元件将可移动硬盘锁定到计算机上。 控制按钮响应于其上的手动推动而产生触发信号。 当接收到触发信号时,微处理器检测在可移动HDD和计算机之间是否存在数据传输,如果存在数据传输,则微处理器终止数据传送,然后向锁定元件发送驱动信号; 如果不是,微处理器直接向锁定元件发送驱动信号。 当接收到驾驶信号时,锁定元件释放可拆卸HDD和计算机之间的锁定,以允许可移动HDD被安全地弹出。 同时,公开了一种具有锁定装置的可拆卸HDD接收系统和一种用于防止可移除HDD从接收系统错误地弹出的方法。

    Systematic Approach to Uncover GUI Logic Flaws
    9.
    发明申请
    Systematic Approach to Uncover GUI Logic Flaws 有权
    揭示GUI逻辑缺陷的系统方法

    公开(公告)号:US20080127341A1

    公开(公告)日:2008-05-29

    申请号:US11772085

    申请日:2007-06-29

    IPC分类号: H04L9/32 G06F3/00

    摘要: To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.

    摘要翻译: 为了实现端到端的安全性,如果图形用户界面(GUI)的完整性受到损害,则传统的机器对机器的安全措施是不够的。 GUI逻辑缺陷是由GUI实现中的逻辑缺陷引起的一类软件漏洞。 这里描述的发明是使用系统推理方法揭露这些缺陷的技术。 该技术的主要步骤包括:(1)将视觉不变量映射到程序不变; (2)对程序逻辑,用户动作和执行上下文进行正式建模,并系统地探索违反程序不变的可能性; (3)根据探索找到真正的欺骗攻击。