摘要:
A pay-per-use or pay-as-you-go computer uses a secure memory to store individual unique program identifiers. Each unique program identifier is associated with a particular hardware or software component, or service, or the entire computer available to a user. By combining the unique program identifier with a computer hardware identifier uniquely identified transactions may be tracked for both billing and reconciliation. Certificates associated with each unique program identifier, and coupled to the hardware identifier, provide a cryptographic basis for mutual verification of messages, requests, configuration instructions, and provisioning.
摘要:
A computer participates in a system for licensing use in a metered fashion using individual licenses cryptographically linked to the computer and a particular service provider or underwriter. The computer may have a cryptographic unit, secure memory, sanction and metering functions as part of a secure execution environment for enabling metered operation and conformance to a security policy. Payment for licenses may be made through a payment system with licenses generated at a server with access to cryptographic functions for verification of requests, certificate/key pair generation, and signing licenses.
摘要:
An application program interface (API) for sending and receiving batches of requests and responses has a batch request call for exchanging one or more request items between a provider system and a subscription system and a batch response call for exchanging corresponding responses between the provider system and the subscription system. Requests are grouped according to an extensible markup language schema and responses are grouped according to another extensible markup language schema.
摘要:
A software provisioning method and apparatus use a provisioning packet delivery mechanism having a database, a distribution service, and a confirmation service to receive, queue, and confirm delivery of provisioning packet to a computer. When the number of unconfirmed delivery requests exceeds a limit the distribution service may remove the provisioning packet from the database, for example, to limit denial of service attacks.
摘要:
An apparatus and method for forming a self-stabilized luggage assembly is disclosed. In one embodiment the method includes coupling a first piece of luggage in contact with a second piece of luggage using an adjustable stabilizer configured to couple a handle on the first piece of luggage to a handle on the second piece of luggage while wheels on the bottom of the first and second pieces of luggage remain on the ground when the first and second pieces of luggage are tilted, upright, moving, and stationary. Other embodiments are described and claimed.
摘要:
A modular system for a golf club bag shoulder strap arrangement has been discovered and is presented here. It includes sub-elements of four primary types. A single point fastener end, a two-to-one ‘V’ connector, a main padded strap, and a connection loop. Each of these elements couples in a special manner to appropriate cooperating sub-elements and may be easily decoupled for replacement, repair, resizing, et cetera. The coupling-decoupling function is indented to be quick, temporary, and replaceable in nature. Thus, these dual straps are provided with functionality not found in similar and competing systems.
摘要:
An apparatus and method for forming a self-stabilized luggage assembly is disclosed. In one embodiment the method includes coupling a first piece of luggage in contact with a second piece of luggage using an adjustable stabilizer configured to couple a handle on the first piece of luggage to a handle on the second piece of luggage while wheels on the bottom of the first and second pieces of luggage remain on the ground when the first and second pieces of luggage are tilted, upright, moving, and stationary. Other embodiments are described and claimed.
摘要:
A wristwatch-engaged ATIS letter designation device and method is provided for employment by users to provide a visual reminder of a designated letter chosen earlier from a group including a plurality of said letters. The system, being wristwatch worn and easily activated, provides an easy way to remember letter designations for subsequent recall minutes or hours later.
摘要:
A client data distribution service may receive messages from a client device requesting data sets from the data distribution service. The data sets may include a client certificate used to protect in verified subsequent communications between the client device in the data distribution service as well as provisioning packets used by the client device to enable operation by the user. Specific messages between the client device in the data distribution service include hardware identifiers, initialization keys, last used sequence numbers, and Underwriter product identifiers. Corresponding acknowledgment messages may be used by the data distribution service to remove completed transactions.