摘要:
Methods and systems are provided for dynamically altering the access capabilities to the data resources for users of a computer based application. The access capabilities are defined by a dynamic role that specifies which of the resources a user may access, and a set of permissions associated with the dynamic role to define. New dynamic roles may be created when additional resources and components are added to an application. Methods and systems are provided for creating new dynamic roles to temporarily access resources, and for deleting a dynamic role after it is no longer needed.
摘要:
A system and method that allows an administrator to set a new password at a wireless access point, such as a traditional WAP or a wireless router. The wireless access point creates a message that includes the new password. The message is encrypted using the old password that was previously set for the wireless network. The encrypted message is wirelessly transmitted from the wireless access point to the active client devices (those clients currently accessing the wireless network). The clients decrypt the message using the old password that was previously provided to the clients. The clients retrieve the new password from the message. The clients construct a new message that is encrypted using the new password. The new message is wirelessly transmitted from the clients to the wireless access device and serves as an acknowledgement.
摘要:
Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource. Further, the embodiment includes locating, based on the request, the resource in a structure having groupings of resources, wherein the groupings include a grouping having the resource. Typically the groupings comprise files having mappings of resources to assigned groups, and each group has an associated authorization table mapping roles or policies to users. Further still, the embodiment includes reading an authorization table associated with the grouping having the resource, and determining whether to grant the access rights for performing the action on the resource.
摘要:
Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource, and locating, based on the request, the resource in both a containment relationship graph and in a structure having groupings of resources, wherein the groupings comprise a grouping having the resource. Further, the embodiment includes traversing a vertex of the containment relationship graph, wherein the vertex comprises a generational resource of the resource, and reading an authorization table associated with a grouping having the generational resource in the groupings. Further still, the embodiment includes determining whether to grant the access rights for performing the action on the resource.
摘要:
Methods, systems, and media are disclosed for managing a resource managed by a mbean server having an mbean. One embodiment includes receiving a request by the application, wherein the request constitutes an action a user seeks to perform on the resource, and adding a number of instance identifier fields to an mbean descriptor file associated with the mbean. Further, the embodiment includes populating the number of instance identifier fields with an equivalent number of properties from an objectname of the resource, thereby producing a populated mbean descriptor file that identifies the resource among resources. Further still, the embodiment includes reading the mbean descriptor file after the populating, and determining, based on the reading, whether the user has an authority to perform the request. If authority exists, then an mbean method performs the action on the resource, and filters the obtained results to coincide with the user's authority.
摘要:
An aqueous and liquid cleansing composition comprises a fatty acid soap, a salt of a lauryl ether sulfate surfactant that is present in an amount that is at least 50% of the weight of the fatty acid soap, a betaine surfactant that is present in an amount that is at least 23% of the weight of the fatty acid soap, and at least 0.05% by weight of the composition of triclocarban. The lauryl ether sulfate and betaine surfactant in the specified amount in relation to the fatty acid soap amount keep the triclocarban from precipitating out of the composition.
摘要:
Improved methods and apparatuses for inserting pedicle screws in accordance with embodiments of the present invention include an image correction algorithm. In various embodiments, an original image of a region of interest of a patient including a pedicle is created with an X-ray emitter and an X-ray detector. Due to the X-ray emitter not being aligned orthogonal to the X-ray detector, the original image will be skewed. Using a known location and orientation of the X-ray detector, a location and orientation of the X-ray emitter provided by a position monitoring system, and the original image, a processing system can execute the image correction algorithm to provide a corrected image to allow a surgeon to properly insert a pedicle screw along the axis of the pedicle while viewing an accurate corrected image in real time.
摘要:
Techniques are provided to start a virtual service node that is configured to provide network traffic services for one or more virtual machines. The virtual service node has at least one associated service profile comprising identifiers for corresponding service policies for network traffic services. The service policies identified in the at least one associated service profile are retrieved. A virtual machine is started with an associated virtual interface and a port profile is applied to the virtual interface, including information identifying the service profile. Information is provided to the virtual service node that informs the virtual service node of network parameters and assigned service profile of the virtual machine. Network traffic associated with the virtual machine is intercepted and redirected to the virtual service node. A virtual service data path is provided that enables dynamic service binding, virtual machine mobility support, and virtual service node chaining and/or clustering.
摘要:
A phototherapy apparatus for the treatment of skin disease is disclosed including: an at least partially hollow body element; a plurality of light emitting elements enclosed within the body element; and a plurality of elongated light transmitting elements, each of the light transmitting elements having a proximal end detachably affixed to the body element in proximity to one or more of the light emitting elements, and extending to an end distal the body element. For each of the elongated light transmitting elements, at least a portion of light incident from the light emitting elements onto the proximal end is directed through the light transmitting element and emitted from the distal end.
摘要:
In one embodiment, an integrated circuit (IC) such as a programmable logic device includes a plurality of IC input terminals and an input buffer having a buffer input terminal and a buffer output terminal. A multiplexer is adapted to selectively couple an IC input terminal to the buffer input terminal or to couple the buffer output terminal to the buffer input terminal.