摘要:
The present invention is an imaging system for detecting concealed objects on an individual. The imaging system includes an imaging zone that is illuminated with millimeter wave energy. A plurality of millimeter wave cameras are focused to fully surround the imaging zone and have the ability to detect millimeter wave frequencies reflected from the imaging zone. As an individual passes through the imaging zone the plurality of millimeter wave cameras detect concealed objects by identifying differences in the millimeter wave energy reflected by the individual's body and a concealed object. A composite image is generated by a central processing unit and displayed on a monitor showing the concealed object on the individual through optical contrast.
摘要:
The present invention is an imaging system for detecting concealed objects on an individual. The imaging system includes an imaging zone that is illuminated with millimeter wave energy. A plurality of millimeter wave cameras are focused to fully surround the imaging zone and have the ability to detect millimeter wave frequencies reflected from the imaging zone. As an individual passes through the imaging zone the plurality of millimeter wave cameras detect concealed objects by identifying differences in the millimeter wave energy reflected by the individual's body and a concealed object. A composite image is generated by a central processing unit and displayed on a monitor showing the concealed object on the individual through optical contrast.
摘要:
A system and method for encryption and decryption of files. The system and method operate in conjunction with the file system to transparently encrypt and decrypt files in using a public key-private key pair encryption scheme. When a user puts a file in an encrypted directory or encrypts a file, data writes to the disk for that file are encrypted with a random file encryption key generated from a random number and encrypted with the public key of a user and the public key of at least one recovery agent. The encrypted key information is stored with the file, whereby the user or a recovery agent can decrypt the file data using a private key. With a correct private key, encrypted reads are decrypted transparently by the file system and returned to the user. One or more selectable encryption and decryption algorithms may be provided via interchangeable cryptographic modules.
摘要:
A file system enables the real-time correction of detected corruptions to on-disk data. An enhancement to a file system responds in real time to file system corruptions detected on a running volume, and repairs the corruptions at the point where the file system detects them. Upon detection of a corruption by the file system, the system enhancement records information describing the nature of the corruption. A repair scan is defined for each type of corruption encountered. Repair scans can be run at the top level of execution in the current thread in which the corruption is detected, or they may require a dedicated thread to service the repair operation.
摘要:
A system and method supporting multiple independent transactional resource managers on a single logical volume, in which each resource manager is a unit of storage management. Each resource manager independently maintains metadata associated with a collection of files that are contained within the scope of a resource manager, such as the files within a subdirectory corresponding to the resource manager. A general architecture allows databases or other entities to integrate with a transactional file system volume via the resource managers, whereby each database has its files independently associated with a transactional resource manager such that database operations do not affect other operations on the volume. Having independent resource managers allows different levels of performance, reliability, feature availability, and manageability to be specified within a single volume. Functions to create, start, and shut down a resource manager are also provided, along with other functions that facilitate resource manager usage.
摘要:
A system and method for encryption and decryption of files. The system and method operate in conjunction with the file system to transparently encrypt and decrypt files in using a public key-private key pair encryption scheme. When a user puts a file in an encrypted directory or encrypts a file, all data writes to the disk for that file are encrypted with a random file encryption key generated from a random number and encrypted with the public key of a user and the public key of at least one recovery agent. The encrypted key information is stored with the file, whereby the user or a recovery agent can decrypt the file data using the private key thereof. When a proper private key is used, encrypted reads from the disk are decrypted transparently by the file system and returned to the user.