摘要:
Techniques are disclosed to provide security for user input in which a first, host operating system is used along with a second, high assurance operating system, where the first system provides at least some of the infrastructure for the second system. Two modes are presented. In a first mode, user data is passed to the host operating system. In a second mode, user data is retained in the second operating system for the use of the second operating system or processes running on the second operating system. Transitions between the nodes can be accomplished according to hypothecated user actions such as keystroke combinations, or when the user performs an action which indicates a programmatic activation of a process running in the second operating system. Where shadow graphical elements are run by the first operating system to indicate the location of graphical elements from processes running on the second operating system, this programmatic activation may be indicated by programmatic activation of a shadow graphical element.
摘要:
Methods for maintaining the security of a secured execution environment on a system comprising said secured execution environment and a second execution environment are disclosed. A maintained current state for the secured execution environment is selected from among a group of possible states including a standard input mode state and a nexus input mode state. A flow of user input is directed according to the current state through a secure kernel of both the second environment and the secured execution environment.
摘要:
Techniques are disclosed to provide security for user input in which a first, host operating system is used along with a second, high assurance operating system, where the first system provides at least some of the infrastructure for the second system. Two modes are presented. In a first mode, user data is passed to the host operating system. In a second mode, user data is retained in the second operating system for the use of the second operating system or processes running on the second operating system. Transitions between the nodes can be accomplished according to hypothecated user actions such as keystroke combinations, or when the user performs an action which indicates a programmatic activation of a process running in the second operating system. Where shadow graphical elements are run by the first operating system to indicate the location of graphical elements from processes running on the second operating system, this programmatic activation may be indicated by programmatic activation of a shadow graphical element.
摘要:
Methods for maintaining the security of a secured execution environment on a system comprising said secured execution environment and a second execution environment are disclosed. A maintained current state for the secured execution environment is selected from among a group of possible states including a standard input mode state and a nexus input mode state. A flow of user input is directed according to the current state through a secure kernel of both the second environment and the secured execution environment.
摘要:
Provided is a novel useful microRNA having improved anti-tumor activity, obtained by introducing a variation in a microRNA which is present in-vivo and which exhibits an anti-tumor effect. This microRNA containing a base sequence (SEQ ID NO: 1) obtained by varying a predetermined region of the base sequence of miR-29b is able to exhibit a particularly outstanding anti-tumor effect.
摘要:
An object of the present invention is to provide an agent that potentiates the antitumor effect of an anticancer agent by allowing efficient accumulation of the anticancer agent in tumor tissue. The administration of carbonate apatite with the anticancer agent allows efficient accumulation of the anticancer agent in the tumor tissue to dramatically potentiate the antitumor effect of the anticancer agent.
摘要:
In one embodiment, a unified pointer message 300 may describe in a single type of pointer message a coordinate input from a user via multiple types of pointer devices. An input device interface 150 may receive a coordinate input 350 from an input device. A processor 120 may execute an application programming interface layer 430 that creates a unified pointer message 300 for the coordinate input 350. The processor 120 may send the unified pointer message 300 to an application. The processor 120 may process a device specific data set 244 unhandled by the application.
摘要:
A polyester monofilament package is formed by reeling a polyester monofilament comprising polyethylene terephthalate and satisfies all of the following requirements (a) to (d): (a) the coefficient of dynamic friction between yarns of the polyester monofilament being 0.13 μd or less; (b) the package end being in a tapered shape with a taper angle (0) of 75° or less; (c) the variation gradient in unreeling tension (AT) being 0.02 cN/dtex-m or less; and (d) in a part of a reeling thickness of 1 mm in the inner layer of the package, the variation in contraction stress of the polyester monofilament being 3.0 cN/dtex or less.
摘要:
The subject disclosure relates to managing z-dimensional ordering of elements within a computing system display through the use of z-order bands. As described herein, z-order bands are utilized to arrange windows and other graphics corresponding to respective application types. A policy engine controls which windows and/or other graphical elements can enter and exit each band. Graphical elements within a given band can additionally be subject to per-band properties corresponding to the band and/or user preferences. As additionally described herein, z-order bands and/or other suitable mechanisms are utilized to facilitate registration watermarking for a computing environment by rendering a registration watermark display upon determining that one or more licensed elements of a computing system have not been registered. The registration watermark display is assigned a z-order band that enables its display over all other graphical elements associated with the computing system and prevents other graphical elements from interfering with its display.