摘要:
Techniques for securing a client. When a client, such as a portable computer, undergoes a change in operational state, an operating system agent sends a state message to a server. The state message describes the change in the operational state of the client. The operating system agent is one or more software modules that execute in an operating system of the client. The client receives a policy message from the server. The policy message contains policy data, which a BIOS agent stores in the BIOS of the client. The policy data identifies one or more security policies which the client should follow.
摘要:
Techniques for performing an action, based on the present location of a client, to protect resources of the client from theft or unauthorized access. A server may intermittently receive, from a client, location information such as GPS information, triangulation information based on one or more Wi-Fi access points, and IP trace information. The server may determine the client's location by (a) determining, for an interval of time, whether GPS information, triangulation information, and IP trace information are available for the client, and (b) based on the available GPS information, triangulation information, and IP trace information, determining the present location of the client, e.g., by determining a weighted arithmetic mean or by using a sequence of types of location information ordered based on accuracy. In response to following a security policy, the server may perform an action, specified by the security policy, based on the present location of the client.
摘要:
Techniques for securing a client. When a client, such as a portable computer, undergoes a change in operational state, an operating system agent sends a state message to a server. The state message describes the change in the operational state of the client. The operating system agent is one or more software modules that execute in an operating system of the client. The client receives a policy message from the server. The policy message contains policy data, which a BIOS agent stores in the BIOS of the client. The policy data identifies one or more security policies which the client should follow.
摘要:
Techniques for performing an action, based on the present location of a client, to protect resources of the client from theft or unauthorized access. A server may intermittently receive, from a client, location information such as GPS information, triangulation information based on one or more Wi-Fi access points, and IP trace information. The server may determine the client's location by (a) determining, for an interval of time, whether GPS information, triangulation information, and IP trace information are available for the client, and (b) based on the available GPS information, triangulation information, and IP trace information, determining the present location of the client, e.g., by determining a weighted arithmetic mean or by using a sequence of types of location information ordered based on accuracy. In response to following a security policy, the server may perform an action, specified by the security policy, based on the present location of the client.
摘要:
Systems and methods are provided that relate to a platform, techniques, and processes for verifying the precision, sensitivity, accuracy, reproducibility, and other characteristics of biological tests, such as DNA identification or other tests or assays. According to various embodiments, a logic engine can guide a user to arrange, conduct, and record studies designed to ensure that chemistry kits and laboratory operations return dependably valid results. The validation platform can manage the design of the entire validation workflow, from initiation of a verification project for one or more chemistry kits or other assays or equipment, to design of individual studies to test the accuracy, sensitivity, reproducibility, and other parameters of biological testing. The validation engine can automatically generate a sample plate layout to conduct individual assays. The validation engine can likewise automatically generate unified data output recording the studies which were undertaken, the assays used, tests results, and other data.
摘要:
The invention relates to an aqueous-based fluoropolymer coating that is especially useful for use over flat or low-slope flexible surfaces, and more specifically for flat or low-slope roofing. The coating can be factory or field applied. The coating offers the advantages of improved durability, lower dirt pick-up, stain resistance, water repellency, increased solar reflectivity duration, and mildew resistance.
摘要:
The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an individual. These systems and methods are useful for, amongst many applications, more secure identification of high-risk individuals attempting to gain access to an entity, transport, information, location, security organization, law enforcement organization, transaction, services, authorized status, and/or funds.
摘要:
Techniques for securing a client. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules that execute in the BIOS of the client. The policy data describes one or more policies which the client should follow. When an operating system agent detects that a condition, specified by a particular policy of the one or more policies, has been met, the operating system agent performs one or more actions specified by the particular policy, such as disabling the client, retrieving a file from the client, erasing a file from the client, or encrypting a file on the client. The operating system agent is one or more software modules that execute in the operating system of the client.
摘要:
An electronic device, for example, a laptop computer includes a processor, a transceiver module, for example, a Bluetooth module and a memory. The memory includes a platform proximity agent, which may be implemented as a series of instructions, which when executed by the processor, causes the processor to receive a Bluetooth signal from a corresponding provisioned Bluetooth device, for example, a cellular telephone. Next, determine whether the received signal exceeds both a strength threshold level and a predetermined time threshold level, where the signal strength and time threshold levels are established when the laptop and a corresponding cell phone are paired during a provisioning process. When the received signal strength and duration both exceed the corresponding policy based thresholds, the laptop enters (or remains in) a full power state with full access to the monitor and the platform. On the other hand, when the received signal strength and duration both fall below (or are less than) the corresponding policy based threshold, the laptop enters (or remains in) a reduced power, or locked state.
摘要:
A multi-generation distributed control system includes a first generation (FG) DCS connected to a local control network (LCN) including FG client nodes. A second generation (SG) DCS connected to a non-LCN data highway includes a server node connected between the LCN and the non-LCN data highway and SG client nodes. The server node includes a LCN processor (LCNP) board. LCNP emulator software including a server LCNP emulator software component is at the server node and a client LCNP emulator software component at the SG client nodes. The server LCNP emulator software component translates between LCN data and data highway protocol data and adds one of a plurality of LCN address slots to communications received from the LCN for delivery to the SG DCS that each correspond to a SG client node. Each client LCNP emulator software component provides one of the LCN address slots at its SG client node.