摘要:
A targeted discovery between a first device and a second device in a network, in particular, a WHDI network, provides discovery for an identified device or a group of identified devices. The targeted discovery determines an identifier for a second device or a group of devices that the second device belongs to, and sends a device discovery message to the second device using the identifier for the second device when the second device is configured to respond to the device discovery message if the device discovery message includes the identifier for the second device. The first device receives a response to the device discovery message from the second device and can start further communication with the second device.
摘要:
Pharmaceutical formulations exhibit a desirably low Cmax, among other properties, that contain particles of amorphous bardoxolone methyl, either in pure form or in the form of a solid dispersion, admixed with particles of a hydrophilic binding agent. Such formulations possess the advantage of higher oral bioavailability, relative to formulations based on the crystalline form of bardoxolone methyl.
摘要:
A method is provided for creating an encrypted data file from a data file having a sample entry box and a media data box. The sample entry box has description information therein. The media data box includes media data therein. The method includes: receiving the data file; encrypting the media data within the media data box with an encryption key; replacing the sample entry box with an encoded box; creating a sinf box within the encoded box; creating a form a box within the sinf box; and creating an schm box within the sinf box. The schm box indicates the type of formatting of the encrypted media data. The encoded box does not include an initial counter that may be used to decrypt the encrypted media data.
摘要:
A method, device and system for securely managing debugging processes within a communication device, such as a set top box or other multimedia processing device. For example, a security processor (SP) within the communication device manages the lifetime (LT) of any access token issued for use in activating debugging privileges within the communication device. The security processor authenticates an issued access token and securely delivers appropriate debug authorization information to the device controller. The security processor uses its secure, internal timer to count down the lifetime and update the remaining lifetime of the issued access token during the processing of each command by the security processor. In addition to securely managing the issuance of the access token and it's remaining lifetime, the updating process reduces any impact on the normal communications within the device. The method overcomes the issue of the communication device not having a secure internal clock.
摘要:
In a method of registering a plurality of client devices with a device registration server for secure data communications, a unique symmetric key is generated for each of the client devices using a cryptographic function on a private key of the device registration server and a respective public key of each of the client devices, and a broadcast message containing the public key of the device registration server is sent to the client devices, in which the client devices are configured to generate a respective unique symmetric key from the public key of the device registration server and its own private key using a cryptographic function, and in which the unique symmetric key generated by each client device matches the respective unique symmetric key generated by the device registration server for the respective client device.
摘要:
A method of generating a Personal Identification Number (PIN) between a first device and a second device in a network is provided. The method includes securely receiving information of input choices of the second device and random numbers assigned to the input choices at the first device. At the first device, the PIN is generated from the random numbers, and instructions are provided directing an entry of the input choices on the second device. At the second device, the input choices are entered. The second device is operable to generate the PIN from the input choices and the random numbers if the input choices are entered as instructed.
摘要:
A partially completed semiconductor integrated circuit device. The device has a semiconductor substrate and a dielectric layer overlying the semiconductor substrate. The device has a gate structure including edges and a substantially pure silicon dioxide mask structure overlying the gate structure. A thickness ranging from about 400 to about 600 Angstroms of the substantially pure silicon dioxide mask structure is included. The device has a dielectric layer forming sidewall spacers on the edges of the gate structure to protect the gate structure including the edges and an exposed portion of the pure silicon dioxide mask structure overlying the gate structure. The device has an epitaxially grown fill material (e.g., silicon/germanium, silicon carbide) in an etched source region and an etched drain region. Preferably, the etched source region and the etched drain region are coupled to the gate structure. The device has a strained channel region between the filled source region and the filled drain region from at least the fill material formed in the etched source region and the etched drain region.
摘要:
Management of rights to content is provided within an authorized domain. In a single authorized domain, where a plurality of domain interfaces are protected using a common rights management system, a copy of particular content may be allowed to be provided on all devices or only on specific devices coupled to the domain via the interfaces. Copy protection information, for outputs to external devices not protected by the common rights management system, is also specified. Rules can be provided for specifying whether particular content may be copied or moved to another protected domain. A number of rendering devices permitted to render the content simultaneously may be specified. Content rules are provided for use in managing rights to content within an authorized domain. Such rules can be associated with content that is persistently stored by a consumer device, as well as with content that is only rendered by a consumer device.
摘要:
Methods are provided for preparing spray-dried, drug-containing particles comprising the steps of: (a) selecting drug, an aqueous solution, and a proton-sequestering agent; (b) adding the drug and the proton-sequestering agent to the solution to form a feed solution; and (c) spray drying the feed solution to form the spray-dried, drug-containing particles, wherein at least a portion of the proton-sequestering agent remains mixed with the drug in the spray-dried, drug containing particles, particles and pharmaceutical formulations comprising the prepared particles as well as methods of use are also provided.
摘要:
The hybrid gas generator to inflate airbags comprises two combustion chambers (14, 16), in each of which a solid material charge (15, 17) is placed, and a storage chamber (11) containing a pressurized storage gas. The storage chamber (11) is connected to diffusion chamber (30) by a closing member (29) which can be perforated. The first solid material charge (15), and the second solid material charge (17) can, for instance, can be sequentially ignited by separate igniter elements (18, 19), thereby determining the pressure accumulation.