摘要:
A system and method for handling a request from a client device to access a service from a server. The method comprises receiving a request from a user using a client device to access a service from a server. The request is received by a network traffic management device having a local external access management (EAM) agent. The EAM agent directly communicates with an EAM server that provides authentication policy information of a plurality of users able to at least partially access the server. User credential information is sent from the EAM agent to the EAM server, whereby the EAM agent receives access policy information of the user from the EAM server. The system and method selectively controls access of the user's request to the server in accordance with the received access policy information at the network traffic management device.
摘要:
A method, non-transitory computer readable medium and application manager computing device comprises obtaining at least one cryptographic key from a request by a client computing device for a user session. User information corresponding to a user is encrypted or decrypted using the cryptographic key. The request is authenticated based on encryption or decryption of the user information. The cryptographic key is deleted after the completion or termination of the user session.
摘要:
A system and method for handling a request from a client device to access a service from a server. The method comprises receiving a request from a user using a client device to access a service from a server. The request is received by a network traffic management device having a local external access management (EAM) agent. The EAM agent directly communicates with an EAM server that provides authentication policy information of a plurality of users able to at least partially access the server. User credential information is sent from the EAM agent to the EAM server, whereby the EAM agent receives access policy information of the user from the EAM server. The system and method selectively controls access of the user's request to the server in accordance with the received access policy information at the network traffic management device.
摘要:
A method, non-transitory computer readable medium and application management computing device includes receiving at an application management computing device a request from a client computing device which requires authentication. A determination is made by the application management computing device whether user network identification information currently is stored for the requesting client computing device. The stored user network identification information for the authentication is obtained by the application management computing device when the user network identification information is determined to be currently stored for the requesting client computing device. The authentication is completed by the application management computing device with the obtained user network identification information.
摘要:
A method for forming an array area with a surrounding periphery area, wherein a substrate is disposed under an etch layer, which is disposed under a patterned organic mask defining the array area and covers the entire periphery area is provided. The patterned organic mask is trimmed. An inorganic layer is deposited over the patterned organic mask where a thickness of the inorganic layer over the covered periphery area of the organic mask is greater than a thickness of the inorganic layer over the array area of the organic mask. The inorganic layer is etched back to expose the organic mask and form inorganic spacers in the array area, while leaving the organic mask in the periphery area unexposed. The organic mask exposed in the array area is stripped, while leaving the inorganic spacers in place and protecting the organic mask in the periphery area.
摘要:
Described are a system and method for clustering wireless devices in a wireless network. The system comprises a wireless access point and a plurality of wireless computing units grouped into a cluster as a function of a predetermined parameter. The cluster includes a cluster head unit and at least one cluster member unit. The at least one cluster member unit utilizes a first power level when wirelessly communicating with the cluster head unit, and the cluster head unit utilizes a second power level when communicating with the AP.
摘要:
Systems and methods consistent with the present invention enable routing table updates are performed by optimally utilizing the resources of a node without exceeding the resources of the node. Using feedback on the amount of resources available to the nodes, such as in terms of available memory, the node may make new connections before breaking old one where those updates will not exceed available resources. This is referred to as make-before-break. When not enough resources are available, the node will break old connections before making new ones. This is referred to as break-before-make. Unlike the strict make-before-break and break-before-make models, this “loose” make-before-break method considers the amount of available resources in view of the resources required to perform the routing table updates without a node failure. Routes may also be tagged to prioritize the addition of more important routes and the deletion of less significant routes. Methods and systems consistent with the present invention, therefore, provide a routing table update method with which routing table updates are achieved without crashing and at the same time minimizing black hole intervals.
摘要:
Scalable and modular WDM systems to provide a number of processing functions which include, among others, signal detection, signal monitoring, wavelength conversion, signal regeneration, and generation of new WDM channels. Such WDM systems include a platform with an optical switching network and module slots for engaging WDM modules of different processing functions. Both protocol transparent and opaque WDM modules may be included in such a WDM system to provide versatile applications.
摘要:
Magneto-optical storage media designed for optical storage systems such as disk drives with optical flying heads. Dielectric layers are designed and implemented to maximize optical coupling between the flying optical head and the media and to reduce variations of signals with flight height of the flying optical head.
摘要:
A deflection mirror tower (DMT) of a multiple-disk array, optical storage system includes a plurality of prism members, each having an angular mirror surface, arranged along a vertical axis of the DMT and configured at a predetermined angular orientation to deflect a laser beam to a respective disk surface. The DMT is generally fabricated using a two-level partitioning process. Several prepared glass substrates, i.e., one for each mirror type, are initially sliced into bars having predetermined geometries. A bar from each substrate is sequentially aligned to a master reference and bonded to adjacent bars to form an intermediate bar stack. The stack is then segmented into a plurality of DMT components, each having a plurality of prism members.