摘要:
Techniques for conducting transactions with one-time passwords are described herein. These techniques may include receiving a request to conduct a transaction, as well as a one-time password and an identifier linked with a payment instrument. The identifier may or may not identify the linked payment instrument. In both instances, a transaction processing service may compare the received one-time password with a one-time password stored at or accessible by the transaction processing service. If the passwords match, the service may approve the transaction. Otherwise, the service may decline the transaction or implement one or more additional authorization procedures.
摘要:
Techniques for automatically approving transactions are described herein. These techniques may include determining whether a user who requested to conduct a transaction is the same user as a user that approves the transaction. If so, then the transaction may be approved. If not, then the approving user may be asked to provide authentication information in order to finish the approval process.
摘要:
A surgical blower for providing a directed stream to clear a surgical site, that can be used in multiple different use modes. In one use mode, the surgical blower is handheld by a user during operation. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is handheld. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is fixed to a stationary object such as a sternal retractor. In another mode, the distal end of the blower is free and the handle of the blower is fixed to a stationary object. An apparatus including a blower and a stabilizer is provided. Methods of using the blower as well as the apparatus are also provided.
摘要:
During operation, a client node can receive a network's topology. Next, the client node can detect a change in an interface's state. The client node can then create an interface state change message which indicates the change in the interface's state. Next, the client node can send the interface state change message to the master node, which can cause the master node to notify other client nodes about the change in the interface's state. If a client node's copy of the link state database (LSD) is out of sync with the master node's LSD, the client node can request the master node to send a full LSD update message to the client node. The master node can multicast messages to the client nodes, and each node in the network can include one or more interfaces that are dedicated for sending and receiving control messages, thereby creating a separate control network.
摘要:
A request to store a data object is received at a hosted storage service. The request includes the data object and an associated object reference. The object reference configured to enable retrieval of the data object from the hosted storage service. The data object is stored at the hosted storage service in association with the object reference. The data object is sent from the hosted storage service to a content delivery network node such that the data object is cached in and retrievable from the content delivery network node using the object reference.
摘要:
Methods and systems to implement voltage level shifting with interim-voltage-controlled contention-interruption. A voltage level shifter (VLS) may include voltage level shift circuitry to level shift an input logical state from an input voltage swing to an output voltage swing. The VLS may include contention circuitry, a contention interrupter, and an interrupt controller to generate a contention-interrupt control having an interim voltage swing. A lower limit of the interim voltage swing may correspond to a lower limit of the output voltage swing. An upper limit of the interim voltage swing may correspond to an upper limit of the input voltage swing. The VLS may be implemented to level shift true and complimentary logical states, such as with cascode voltage switch logic (CVSL). The interim-voltage-controlled contention interrupter may help to maintain voltages within process-based voltage reliability limits of the contention interrupter, with relatively little delay, and relatively little power and area consumption.
摘要:
Methods, devices, and systems are provided for filtering packets and other communication messages or portions thereof. Particularly, mechanisms are provided for efficiently determining and applying a set of trust-based filtering rules. Trust scores may be assigned to various connections and packets received on a particular connection may have filtering rules applied thereto in accordance with the trust score of the connection.
摘要:
The pricing of a product is programmatically managed by defining a plurality of pricing states for the product. Each pricing state has a pricing mechanism associated therewith. A pricing mechanism can be a variable pricing mechanism such as an auction. It can also be a fixed pricing mechanism for the sale, rental, or subscription of the product. One or more triggers are defined, each of which may include one or more trigger parameters, to enable the pricing of the product to transition from one pricing state to another pricing state. In this manner, an automated, systematic approach to pricing management is provided.
摘要:
A surgical blower for providing a directed stream to clear a surgical site, that can be used in multiple different use modes. In one use mode, the surgical blower is handheld by a user during operation. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is handheld. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is fixed to a stationary object such as a sternal retractor. In another mode, the distal end of the blower is free and the handle of the blower is fixed to a stationary object. An apparatus including a blower and a stabilizer is provided. Methods of using the blower as well as the apparatus are also provided.
摘要:
Methods, devices, and systems for controlling access to a password protected resource are provided. More specifically, different communication profiles can be mapped to a single user and that user can utilize a single password to gain access to the password protected resource using any one of his/her communication profiles. Each communication profile may have a unique authentication value associated therewith, but each unique authentication value may be determined based on the single password, thereby eliminating the need for a user to remember multiple passwords for each of his/her communication profiles.