摘要:
Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with multiple independent networks (e.g., domains) may be established and maintained. Moreover, a credential manager provides a credential model retrofit for legacy applications that only understand the password model. The manager provides a mechanism where the application is only a “blind courier” of credentials between the trusted part of the OS to the network and/or network resource. The manager fully insulates the application from “read” access to the credentials. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
摘要:
The devices and methods taught in this disclosure are directed to facilitate the observation, collection, transportation, storage, and preservation of specimens possibly containing DNA, said specimens potentially constituting evidence of sexual assault. The devices and methods described further allow for a means of minimizing the possibility of specimen contamination, dilution, or degradation during the collection and storage processes. The disclosed devices may contain electrical components that provide for the generation and recordation of information (specifically, times, dates, and locations) related to circumstances surrounding the collection of such specimens. This information may serve as evidence corroborating the circumstance of specimen collection, it may help to maintain a known and identifiable Chain of Custody (CoC), and it may additionally be used for unique device identification (UDI), inventory control, and current procedural terminology (CPT) coding purposes.
摘要:
An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
摘要:
A load sharing right angle bevel gear drive comprises a housing having a power bevel gear that meshes with two bevel gears that are mounted in the housing for rotation about a second axis that is perpendicular to the axis of rotation of the power bevel gear.The power bever gear is mounted in a sleeve that automatically translates to equalize the power transmitted from the power bevel gear to the two bevel gears. The power bevel gear is axially retained in the sleeve by spaced rolling bearings and the sleeve translates on slides that retain the sleeve axially to counteract the axial components of the forces that automatically translate the sleeve.In one embodiment, One bevel gear is a power output gear and the other bevel gear is an idler gear that also drives the power output gear through a fourth bevel gear. In another embodiment both bevel gears are power output gears. The sleeves of both embodiments preferably translate on slide pins via recirculating bearing balls to reduce friction. Both embodiments may employ hydraulic damping for the slide pins.
摘要:
Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the application invokes a trust manager to evaluate the security risks. The trust manager invokes a plurality of trust evaluators, where each trust evaluator is responsible for analyzing and assessing a different security risk. Upon completion of each security risk evaluation, results of those individual security risk evaluations are returned to the trust manager. The trust manager aggregates the variety of security risk evaluation results and makes a security determination based on the aggregated evaluation results. That determination may be to move forward with loading the application, to block the load of the application, or perhaps to prompt the user for a decision about whether to move forward with the load.
摘要:
A twin turbine engine helicopter has a two-stage main reduction gearbox, the input stage having a speed reduction ratio exceeding 5.5:1, into an epicyclic gear train second stage ratio about 6:1 for approximately 30:1 or higher overall ratio output to the main rotor. In various embodiments, the first stage uses face gears, or bevel gears, with a reduction greater than 5.5:1 and a second stage epicyclic gear train using single or double row helical or spur gears. The first stage gears are straddle mounted in the housing.
摘要:
An aircraft (10) having turboprop propulsion has a plurality of gas turbine engines (11), each with a two stage reduction gearbox (30,41) with the engine output shaft (17,17A) inline with the propeller drive output shaft (19,51) to drive a propeller (12) in front of the engine in a tractor mode of propulsion. The input gear reduction stage (20) and output gear reduction stage (21) share a plurality layshafts (22,38) mounted in fixed circularly-spaced relation to each other about the axis of the output shafts in the mechanical housing in the aircraft. Each layshaft of said plurality of layshafts has a layshaft first end toward the rear, input end of the gearbox, and a layshaft second end toward the output, front end of the gearbox. The layshaft gears are arranged to avoid any net thrust loading of the layshafts. Spur (26) and double helical (27) are used in FIG. 4, while spur gears 37 and 48 are used in FIG. 6 with suitable helix settings to neutralize end thrust on layshaft 38. Cantilever layshaft input gear (37) mounting in rear bearings (39) enables it to share some layshaft output gear 48 load sharing with the front bearing (40). A torquemeter (61) is conveniently situated at the gearbox input end. The engine output gear (25,36) and gearbox output gear (28,49), and propeller (12) all have colinear rotational axes.
摘要:
An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
摘要:
An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current state of the device is generated. Both an indication of the bucket and the record describing the current state of the device are then sent to a server. At the server, error information including error records and bucket identifiers are received from multiple devices. Each error record describes a current state of one of the multiple devices at a time when an error in a web page displayed on the one device was detected. Each bucket identifier corresponds to one of the error records and describes a type of the error associated with that error record. The error records are grouped into multiple baskets based at least in part on the current state information in the error records.
摘要:
Evidence-based application security may be implemented at the application and/or application group levels. A manifest may be provided defining at least one trust condition for the application or application group. A policy manager evaluates application evidence (e.g., an XrML license) for an application or group of applications relative to the manifest. The application is only granted permissions on the computer system if the application evidence indicates that the application is trusted. Similarly, a group of applications are only granted permissions on the computer system if the evidence indicates that the group of applications is trusted. If the application evidence satisfies the at least one trust condition defined by the manifest, the policy manager generates a permission grant set for each code assembly that is a member of the at least one application. Evidence may be further evaluated for code assemblies that are members of the trusted application or application group.