摘要:
An information security system and method that provides electric power to an authorized user and denies electric power to an unauthorized user. An administrator requests access for a user, and a site controller generates a key/receptacle tuple for the use. The key/receptacle tuple is communicated to a site power source, which broadcasts the key/receptacle information to all secure receptacles in a facility, or other infrastructure. The key is also communicated to the user. The user plugs in a device into a secure receptacle and provides the key via a secure adapter between the device and the secure receptacle. If the key is valid, the users' device is supplied with electric power; otherwise, electric power is denied to the unauthorized user's device. The usage of the secure receptacles are logged and analyzed by the site controller and reports are communicated to the administrator.
摘要:
A system and method are disclosed for virtual replication of a user's mobile device using a plurality of master and auxiliary host servers, a failover server, and connectivity to network and telephony, mobile voice and text services. According to one example embodiment, a user of a mobile device creates an account on the master host server via a mobile device application that uploads the data and settings of the mobile device to the master host server. The master host server via a master controller distributes the user data and settings among the plurality of the auxiliary host servers, where the user data and settings are combined into a mobile device image that is optionally compressed, mirrored, split, and stored in a plurality of storage facilities among the auxiliary host servers. Upon single or two-factor authentication, the user who no longer has access to their mobile device, accesses the host server via a client device's browser interface and gains access to the mobile device image via replication and hosting in an auxiliary host server optimally selected by the master host server. When the auxiliary host servers are unreachable, the user requests through a secondary channel for communication to the help facility that is a separately enabled process. The replicated mobile device images provide the user with access to the data and functionality of their original mobile device and the changes are stored in an updated mobile device image. Upon request by the user, the most recent version of the mobile device image is transferred to either the original mobile device for further use, or to a new mobile device in the event the user replaced the original.
摘要:
An information security system and method that provides electric power to an authorized user and denies electric power to an unauthorized user. An administrator requests access for a user, and a site controller generates a key/receptacle tuple for the use. The key/receptacle tuple is communicated to a site power source, which broadcasts the key/receptacle information to all secure receptacles in a facility, or other infrastructure. The key is also communicated to the user. The user plugs in a device into a secure receptacle and provides the key via a secure adapter between the device and the secure receptacle. If the key is valid, the users' device is supplied with electric power; otherwise, electric power is denied to the unauthorized user's device. The usage of the secure receptacles are logged and analyzed by the site controller and reports are communicated to the administrator.
摘要:
The present invention is a tamper-proof container, which provides secure storage of a valued artifact and optionally destroys the valued artifact if the container is compromised. The core components of the invention are an airtight container comprising a first shell and a second shell, which contains the valued artifact, a gas pressure sensor assembly, a lever assembly, a trigger assembly, a wrecker assembly, and an optional alarm assembly. A predetermined gas pressure is used as the key to protect the container. During the assembly of the container the internal pressure is set to the predetermined container pressure and the container is sealed. If compromised, the change in gas pressure is detected by the gas pressure sensor assembly, which triggers the trigger assembly via the lever assembly, and activates the wrecker assembly to destroy the artifact. Optionally, the trigger assembly activates the alarm assembly to alert the user.
摘要:
A system or method provides electric power to an authorized user and denies electric power to an unauthorized user. An administrator requests access for a user, and a central controller generates a key/receptacle tuple for the access. The key/receptacle tuple is communicated to a site power controller, which broadcasts the key/receptacle information to secure receptacles in a facility. The key is also communicated to the user. The user plugs in a device into a secure receptacle and provides the key via a secure adapter. If the key is valid, the device is supplied with electric power; otherwise, electric power is denied. The central controller logs and analyzes activities of the secure receptacles and reports to the administrator.
摘要:
A system and method are disclosed for virtual replication of a user's mobile device using a plurality of master and auxiliary host servers, a failover server, and connectivity to network and telephony, mobile voice and text services. According to one example embodiment, a user of a mobile device creates an account on the master host server via a mobile device application that uploads the data and settings of the mobile device to the master host server. The master host server via a master controller distributes the user data and settings among the plurality of the auxiliary host servers, where the user data and settings are combined into a mobile device image that is optionally compressed, mirrored, split, and stored in a plurality of storage facilities among the auxiliary host servers. Upon single or two-factor authentication, the user who no longer has access to their mobile device, accesses the host server via a client device's browser interface and gains access to the mobile device image via replication and hosting in an auxiliary host server optimally selected by the master host server. When the auxiliary host servers are unreachable, the user requests through a secondary channel for communication to the help facility that is a separately enabled process. The replicated mobile device images provide the user with access to the data and functionality of their original mobile device and the changes are stored in an updated mobile device image. Upon request by the user, the most recent version of the mobile device image is transferred to either the original mobile device for further use, or to a new mobile device in the event the user replaced the original.
摘要:
Plural characteristics of text documents are extracted, where the plural characteristics include citations to or from other text documents and at least one other characteristic. At least one of the text documents is a patent. Each of the text documents is associated with a corresponding collection of the plural characteristics. An output is generated using the collections of the plural characteristics, where the output indicates relationships among at least a subset of the text documents including the patent based on the collections of the plural characteristics.
摘要:
A landing adviser system for aircrafts comprising of a main housing, a microcontroller installed within the main housing, an environmental sensor array connected to the main housing, where the environmental sensor array electronically communicates with the microcontroller, a portable power source in the proximity of the main housing, where the portable power source provides electrical power to the microcontroller and the sensor array, a landing data collected by the environmental sensor array, where the landing data is communicated to the microcontroller, and a communication module for communicating the landing data from the microcontroller to the pilot of an aircraft. The environmental sensor array comprises an anemometer, an optical sensor and range finder, a thermometer, a hygrometer, a penetrometer, a gyroscope, and a global positioning system. The system further comprises an external sensor post, a beacon, algorithms for computing wind gusts and turbulence around nearby structures, and a padded carrying case.
摘要:
The present invention relates to a device and a method associated with helping blind dogs navigate. With respect to the device, it is a set of one or more sensors and stimulators, which provide situational awareness to a blind dog regarding objects and sudden drops in its vicinity, helping the dog freely move about without the risk of collision or fall. The core components of the invention are a distance sensor, a microcontroller, a tactile/audio stimulator, an accelerometer, a power source, a control panel, a body harness, and a head wrap, which, generally speaking, are configured as follows: a frontal distance sensor mounted on top of a blind dog's head using the head band, the lower distance sensor, the stimulators, the microcontroller, the accelerometer, the power source, and the control panel are mounted on the blind dog using the body harness. With respect to the associated method, in order to carry out the method the following core steps are followed: a frontal distance sensor method to detect the objects in front of the blind dog and alert the blind dog when a collision is imminent, a drop sensor method to detect sudden drops in front of the blind dog and alert the dog when a fall is imminent, a velocity calibration method and a velocity computation method determine the movements of the dog based on accelerometer signals, and a velocity compensated alert method adjust and increase the alert distance/time when the dog is moving toward an obstacle or a drop.
摘要:
In certain embodiments, a method for managing delivery of electronic messages includes receiving an electronic message, the electronic message having an intended recipient, and analyzing the electronic message to determine a priority for the electronic message. The method further includes determining, based on the determined priority for the electronic message; whether to deliver the electronic message to the intended recipient at the current time. If it is determined, based on the determined priority for the electronic message, that the electronic message should be delivered to the intended recipient at the current time, delivery of the electronic message to the intended recipient is initiated.