摘要:
In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.
摘要:
In one aspect, a first processing device, which may be an authentication token, establishes a shared key through a pairing protocol carried out between the first processing device and a second processing device. The pairing protocol also involves communication between the second processing device and an authentication server. As part of the pairing protocol, the first processing device sends identifying information to the second processing device, and the second processing device utilizes the identifying information to obtain the shared key from the authentication server. The first processing device encrypts authentication information utilizing the shared key, and transmits the encrypted authentication information from the first processing device to the second processing device. The second processing device utilizes the shared key to decrypt the encrypted authentication information.
摘要:
A first processing device, which may be, for example, a wireless authentication token or an RFID tag, transmits information in a wireless network in a manner that emulates standard communications of an access point of the wireless network, although the first processing device is not configured to operate as an actual access point of the wireless network. A second processing device, which may be, for example, a computer or other station of the wireless network, receives the transmitted information and is able to determine therefrom that the information originates from an emulated access point rather than an actual access point. The second processing device responds to this condition by utilizing the transmitted information in a manner distinct from its utilization of similar information received from the actual access point of the wireless network.
摘要:
Techniques for providing authentication functionality in a gaming system are disclosed. In one aspect, a gaming system is configured such that, at a given point during a current session of a game in progress that involves at least one user previously granted access by the system to participate in the current session, information available from an authentication token associated with the user is obtained prior to allowing the user to take a particular action in the game. A determination is made as to whether or not the user will be allowed to take the particular action in the game, based on the obtained information. The obtained information may comprise, for example, at least a portion of a one-time password generated by a hardware or software authentication token.
摘要:
The present invention provides a device for segmenting a bone. The bone is segmented in two cuts i.e. an initial cut and a final cut. While segmenting the bone, the device is clamped to the bone directly or with the help of a block attached to the bone. An initial cut is taken after the clamping is performed. An upper part of the device is then moved to a predetermined length and the final cut is taken. Thus, the device enables an accurate length of cut to be taken while segmenting the bone. The device also enables varied length of cuts to be taken while segmenting the bone.
摘要:
A proxy device is disclosed for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with the proxy device and one or more of the RFID devices. The proxy device acquires information characterizing at least a given one of the RFID devices, controls the given RFID device so as to at least partially prevent the given RFID device from being read by the reader, and communicates with the reader in a manner which simulates the given RFID device. This advantageously allows the proxy device to implement privacy policies of arbitrary sophistication on behalf of the given RFID device. The proxy device subsequently releases control of the given RFID device so as to permit the given RFID device to again be read by the reader.
摘要:
A loudspeaker comprising a loudspeaker drive unit being operable to radiate sound in a forward direction and a rearward direction and an enclosure configured to receive sound radiated in the rearward direction. The enclosure comprises a passageway system comprising a plurality of parts of different lengths. Each of the different length parts has an opening, whereby rearward radiated sound induces standing wave resonances of air in the different length parts at different fundamental frequencies.
摘要:
A technique of message-passing using shared memory of an RF tag involves storing a message in the shared memory while a security processor of the RF tag is in a sleep mode, the security processor being constructed and arranged to access the shared memory when the security processor is in a wakened mode. The technique further involves transitioning the security processor from the sleep mode to the wakened mode, and processing the message from the shared memory using the security processor after the security processor has transitioned from the sleep mode to the wakened mode. If the security processor is awakened only as needed (rather than remain in the wakened mode), lifetime of a battery which powers the security processor can be maximized.
摘要:
A system, apparatus, and method for a core rationing logic to enable cores of a multi-core processor to adhere to various power and thermal constraints.
摘要:
This invention is a singular unit, designed to work with almost any extension ladder, for the purpose of protecting the surface upon which the ladder is employed form dents, scratches, or marks caused by the bare ends of the ladder rails. It consists of a solid base plate of approximately twelve inches by eighteen inches, on one side of which is fastened by means of adhesive a foam rubber cushion. On the opposite side of which at each end is a means of attaching a nylon strap. These are used opposing each other to attach the unit to the ladder at the top or directly above any rung on the ladder, thereby securing the unit and yet allowing enough flexibility so that the unit will seek its own level against the surface upon which it is employed.