摘要:
The invention provides a more handy and environment friendly process for preparing risperidone, which comprises reacting 6-fluoro-3-(4-piperidinyl)-1,2-benzisoxazole hydrochloride with 3-(2-chloroethyl)-2-methyl-6,7,8,9-tetrahydro-4H-pyrido[1,2-a]pyrimidin-4-one in a basic aqueous solution or suspension. The concentration of alkaline metal carbonates in the basic aqueous solution or suspension is ranged from 15% to 40%. The reaction is carried out at a temperature range of 101-140° C. and the reaction is completed within 10 minutes to 2 hours.
摘要:
A method for providing access to one or more resources in a computer network, establishing a connection between a user and the computer network via at least one wireless access point, generating an authentication level for the user associated with accessing the one or more resources, sending a program to the client device, receiving authentication data from the user, and changing the authorization level of the user based upon the authentication data received from the user.
摘要:
According to one embodiment of the invention, a method for managing ad-hoc connections in a wireless network includes receiving, at an endpoint device, a connection policy from a managing device over the wireless network. The connection policy indicates network security settings for the endpoint device. The method also includes detecting at the endpoint device an ad-hoc connection. The method further includes responding to the ad-hoc connection based on the connection policy.
摘要:
A method for providing access to one or more resources in a computer network, establishing a connection between a user and the computer network via at least one wireless access point, generating an authentication level for the user associated with accessing the one or more resources, sending a program to the client device, receiving authentication data from the user, and changing the authorization level of the user based upon the authentication data received from the user.
摘要:
According to one embodiment of the invention, a method for generating an advisory message for an endpoint device includes determining a threat level for the endpoint device by identifying a connection type between the endpoint device and the wireless network. The method also includes determining a second threat level for the endpoint device by identifying a security policy of the endpoint device. The method further includes generating an advisory message for the endpoint device based on the threat levels. The advisory message indicates vulnerability of the endpoint device.
摘要:
According to one embodiment of the invention, a method for generating an advisory message for an endpoint device includes determining a threat level for the endpoint device by identifying a connection type between the endpoint device and the wireless network. The method also includes determining a second threat level for the endpoint device by identifying a security policy of the endpoint device. The method further includes generating an advisory message for the endpoint device based on the threat levels. The advisory message indicates vulnerability of the endpoint device.