摘要:
A method and system for deriving fluid leak information are described. A plurality of sealing elements are introduced into the pipeline at a location upstream of the leak, and at least some of the sealing elements are drawn towards the leak to cause a sealing event which reduces fluid seepage. A pressure change caused by the sealing event is detected, and associated time data is used to derive information about the leak. In one embodiment, leak location information is derived. In an alternative embodiment, pressure transient information is used to derive leak size information.
摘要:
A method and system for deriving fluid leak information are described. A plurality of sealing elements are introduced into the pipeline at a location upstream of the leak, and at least some of the sealing elements are drawn towards the leak to cause a sealing event which reduces fluid seepage. A pressure change caused by the sealing event is detected, and associated time data is used to derive information about the leak. In one embodiment, leak location information is derived. In an alternative embodiment, pressure transient information is used to derive leak size information.
摘要:
The present invention concerns a method for reducing seepage through a leak (5) in a duct (1), the leak being defined in terms of its maximum dimension xL and its maximum width in an orthogonal direction yL and the effective size of the leak being given by formula (1): SL=(x2L+y2L)1/2. A plurality of sealing elements (3) are introduced into the duct, the sealing elements having dimensions a, b and c in mutually orthogonal directions and the effective size SE of the sealing element being given by formula (2): SE=(a2+b2+c2)1/2. The sealing elements have an effective size SE, which is less than the effective size of the leak SL, so that sealing elements (3A) are drawn to the leak locality and caused, by reason of a pressure differential at that locality and attributable to the leak, to move over the leak and reduce the seepage.
摘要翻译:本发明涉及一种通过管道(1)中的泄漏(5)减少渗漏的方法,该泄漏是根据其最大尺寸x L L定义的,其垂直方向上的最大宽度y 并且泄漏的有效大小由公式(1)给出:S(L)=(x2)L SUB > + y <2> i> i> p> u> 将多个密封元件(3)引入管道中,密封元件具有相互正交的方向上的尺寸a,b和c,密封元件的有效尺寸SE由公式(2)给出:S E SUB> =(a 2 SUP> 2 + 2 + 2 SUP> 2/2)。 密封元件具有小于泄漏S L L的有效尺寸的有效尺寸,使得密封元件(3A)被抽吸到泄漏 由于该地区的压力差异并导致泄漏,导致泄漏事故发生,并导致渗漏。
摘要:
An administrator may set restrictions related to the operation of a virtual machine (VM), and virtualization software enforces such restrictions. There may be restrictions related to the general use of the VM, such as who may use the VM, when the VM may be used, and on what physical computers the VM may be used. There may be similar restrictions related to a general ability to modify a VM, such as who may modify the VM. There may also be restrictions related to what modifications may be made to a VM, such as whether the VM may be modified to enable access to various devices or other resources. There may also be restrictions related to how the VM may be used and what may be done with the VM. Information related to the VM and any restrictions placed on the operation of the VM may be encrypted to inhibit a user from circumventing the restrictions.
摘要:
A client installation and execution system for streamed applications requires the user or administrator to obtain a subscription to the streamed application program from a subscription server before installation of the streamed application program begins. The client then obtains an encrypted access token for the streamed application program from a license server upon acknowledgment of a valid license, receives an installation information block from the server, and installs the proper icons, aliases, and description onto the client that give the user the proper look and feel of the original application program. A file spoofer is installed on the client that redirects file accesses from the client's local file system to the streaming server's file system. A registry spoofer is provided on the client for intercepting all registry calls on the client and redirecting calls that manipulate certain registries to an alternate path specified in a registry database on the client. An application page cache is also provided on the client that is managed by a cache manager that requests application pages of the streamed application program from the server. During execution of the streamed application program, page requests are generated and the cache manager requests any application pages from the server that are not resident in the application page cache and places the requested application pages in the application page cache.
摘要:
Improved approaches for securing files that are derived from secured files are disclosed. In general, a secured file can only be accessed by authenticated users with appropriate access rights or privileges. Each secured file is provided with a header portion and a data portion, where the header portion contains, or points to, security information. The security information is used to determine whether access to associated data portions of secured files is permitted. These improved approaches can thus impose security on files that are derived from secured files. In one embodiment, files that are deemed derived from a secured file include files that are copies of the secured file. In another embodiment, files that are deemed derived from a secured file include files having content substantially similar to the content of the secured file.
摘要:
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e.g., a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated, and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.
摘要:
Techniques for utilizing time-based security criteria in a file security system are disclosed. At least a portion of the security criteria can have a time associated therewith (i.e., time-based security criteria) that serves as a time-based restriction on the ability to gain access to electronic files. If the time-based restriction is not satisfied, then the associated security criteria is not made available and thus access to a secured electronic file is prevented. In other words, access restrictions on electronic files can be dependent on the time at which access to the electronic files is attempted. The security criteria can pertain to keys (or ciphers) used by the file security system to secure (e.g., encrypt) electronic files to be secured, or to unsecure (e.g., decrypt) electronic files already secured.