MOBILE DEVICE IDENTIFY FACTOR FOR ACCESS CONTROL POLICIES
    2.
    发明申请
    MOBILE DEVICE IDENTIFY FACTOR FOR ACCESS CONTROL POLICIES 有权
    用于访问控制政策的移动设备识别因子

    公开(公告)号:US20130219469A1

    公开(公告)日:2013-08-22

    申请号:US13398616

    申请日:2012-02-16

    IPC分类号: G06F21/00

    摘要: A secure VPN connection is provided based on user identify and a hardware identifier. A client application may initiate the VPN connection. A client device user may provide identification information to the application, which then sends a VPN connection request to a remote VPN gateway. The VPN gateway may require an equipment identifier to establish the secure VPN gateway. If the hardware ID is registered, the secure VPN connection is established. If the hardware ID is not registered with the VPN gateway, the connection may be denied. In some instances, a connection may be established with an unregistered equipment ID based on settings at the VPN gateway.

    摘要翻译: 基于用户识别和硬件标识符提供安全的VPN连接。 客户端应用程序可以启动VPN连接。 客户端设备用户可以向应用提供识别信息,然后该应用将VPN连接请求发送到远程VPN网关。 VPN网关可能需要设备标识符来建立安全VPN网关。 如果注册了硬件ID,则建立安全VPN连接。 如果硬件ID未注册到VPN网关,则连接可能被拒绝。 在某些情况下,可以基于VPN网关上的设置,使用未注册的设备ID建立连接。

    Opto-Acoustic Imaging Devices and Methods
    4.
    发明申请
    Opto-Acoustic Imaging Devices and Methods 有权
    光声成像设备和方法

    公开(公告)号:US20110172511A1

    公开(公告)日:2011-07-14

    申请号:US13051567

    申请日:2011-03-18

    IPC分类号: A61B5/05

    摘要: In one aspect, the invention relates to a probe. The probe includes a sheath, a flexible, bi-directionally rotatable, optical subsystem positioned within the sheath, the optical subsystem comprising a transmission fiber, the optical subsystem capable of transmitting and collecting light of a predetermined range of wavelengths along a first beam having a predetermined beam size. The probe also includes an ultrasound subsystem, the ultrasound subsystem positioned within the sheath and adapted to propagate energy of a predetermined range of frequencies along a second beam having a second predetermined beam size, wherein a portion of the first and second beams overlap a region during a scan.

    摘要翻译: 一方面,本发明涉及一种探针。 探针包括位于护套内的护套,柔性双向可旋转的光学子系统,光学子系统包括传输光纤,该光学子系统能够沿着具有第一光束的第一光束发射和收集预定波长范围的光 预定的光束尺寸。 所述探针还包括超声子系统,所述超声子系统位于护套内并且适于沿具有第二预定光束尺寸的第二光束传播预定频率范围的能量,其中第一和第二光束的一部分在 扫描。

    Combination dispenser and frame
    5.
    发明授权
    Combination dispenser and frame 有权
    组合分配器和框架

    公开(公告)号:US07331485B2

    公开(公告)日:2008-02-19

    申请号:US11687200

    申请日:2007-03-16

    IPC分类号: B67D5/06

    CPC分类号: B65D23/00 B65D2203/12

    摘要: A dispenser for dispensing materials is provided including a container for holding the material to be dispensed, a plurality of frame portions for holding decorative items, locking apparatus for locking the frame portions to the container, and a dispensing means for dispensing materials from the container. The dispenser also includes a base for receiving the container and frame portions, a memory device for playing a sound when the dispenser is removed from the base, and a switch for activating the memory device when the container is removed from the base. The plurality of frames each contain an aperture and each aperture contains an inner edge operable to lock onto the container. The frames each contain clips to lock onto each other and hold the container. The dispenser includes a dispensing mechanism and the base includes an opening for receiving the dispensing mechanism. The dispenser may also include a cap for receiving the container and frame portions and a cover for covering the aperture may be included.

    摘要翻译: 提供了用于分配材料的分配器,包括用于保持要分配的材料的容器,用于保持装饰物品的多个框架部分,用于将框架部分锁定到容器的锁定装置,以及用于从容器分配材料的分配装置。 分配器还包括用于接收容器和框架部分的基座,当从基座移除分配器时播放声音的存储装置,以及当容器从基座移除时用于启动存储装置的开关。 多个框架各自包含孔,并且每个孔包含可操作以锁定到容器上的内边缘。 这些框架各自包含夹子以夹持容器。 分配器包括分配机构,并且底座包括用于接收分配机构的开口。 分配器还可以包括用于容纳容器和框架部分的盖,并且可以包括用于覆盖孔的盖。

    Methods and systems for evaluating the health of computing systems based on when operating-system changes occur
    8.
    发明授权
    Methods and systems for evaluating the health of computing systems based on when operating-system changes occur 有权
    基于何时发生操作系统变化来评估计算系统健康的方法和系统

    公开(公告)号:US08281403B1

    公开(公告)日:2012-10-02

    申请号:US12476782

    申请日:2009-06-02

    IPC分类号: G06F21/00

    摘要: A computer-implemented method for evaluating the health of computing systems based on when operating-system changes occur is disclosed. In one example, this method may include: 1) identifying an operating-system change made to a computing system, 2) determining when the operating-system change occurred, and then 3) assessing the health of the computing system based at least in part on when the operating-system change occurred. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 公开了一种用于基于操作系统变化发生时计算系统健康状况的计算机实现方法。 在一个示例中,该方法可以包括:1)识别对计算系统进行的操作系统改变,2)确定何时发生操作系统变化,然后3)至少部分地评估计算系统的健康状况 当操作系统发生变化时。 还公开了各种其它方法,系统和计算机可读介质。

    Heuristic detection malicious code blacklist updating and protection system and method
    9.
    发明授权
    Heuristic detection malicious code blacklist updating and protection system and method 有权
    启发式检测恶意代码黑名单更新和保护系统及方法

    公开(公告)号:US08225405B1

    公开(公告)日:2012-07-17

    申请号:US12362352

    申请日:2009-01-29

    IPC分类号: H04L29/06

    CPC分类号: H04L63/145 H04L63/205

    摘要: Unknown malicious code is heuristically detected on a host computer system. A virus signature for the malicious code is created locally on the host computer system. A blacklist on the host computer system is updated with the virus signature for the heuristically detected malicious code. Accordingly, the blacklist is updated with the virus signature of the heuristically detected malicious code without distribution of the virus signature to the general public. Further, the host computer system is scanned for other instances of the heuristically detected malicious code using the created virus signature. Accordingly, file based detection and remediation of the malicious code is achieved without requiring execution of the malicious code for detection and the associated risks.

    摘要翻译: 在主机系统上启发式地检测到未知的恶意代码。 恶意代码的病毒签名在主机计算机系统上本地创建。 使用启发式检测到的恶意代码的病毒签名更新主机计算机系统上的黑名单。 因此,利用启发式检测的恶意代码的病毒签名更新黑名单,而不向该公众分发病毒签名。 此外,使用所创建的病毒签名扫描主计算机系统的启发式检测的恶意代码的其他实例。 因此,可以实现恶意代码的基于文件的检测和修复,而不需要执行用于检测的恶意代码和相关联的风险。