摘要:
A system and method that provides a JPeX client that opens up a socket on which it listens for connections from the local host. External applications on the desktop are able to connect to the server socket in the client and use XML to execute commands on the client.
摘要:
A system and method that provides a JPeX client that opens up a socket on which it listens for connections from the local host. External applications on the desktop are able to connect to the server socket in the client and use XML to execute commands on the client.
摘要:
A system and method that provides a JPeX client that opens up a socket on which it listens for connections from the local host. External applications on the desktop are able to connect to the server socket in the client and use XML to execute commands on the client.
摘要:
An inspection system for detecting anomalies on a substrate. The inspection system has a sensor array for generating image data. A first high speed network is coupled to the sensor array and receives and communicates the image data. An array of process nodes is coupled to the first high speed network, and receives and processes the image data to produce anomaly reports. Each process node has an interface card coupled to the first high speed network, that receives the image data from the first high speed network and formats the image data according to a high speed interface bus protocol. The interface card sets a register indicating whether a predetermined amount of image data has been stored in a memory, and the process node reads the register to determine whether the predetermined amount of image data has been stored in the memory, and initiates image processing when the register indicates that the predetermined amount of image data has been stored in the memory.
摘要:
An inspection system for detecting anomalies on a substrate. A first network is coupled to a sensor array and communicates data. Process nodes are coupled to the first network, and process the data to produce reports. Each process node includes memory sufficient to buffer the data until it can process the data. Each process node has an interface card that formats the data for a high speed interface bus that is coupled to the interface card. A computer receives and processes the data to produce the report. A second network receives the reports. A job manager is coupled to the second network, receives the reports, and sends information to the process nodes to coordinate processing of the data.
摘要:
Electronic Tags are mounted on swimmers to reduce their risk of drowning by identifying when their heads are underwater for periods of time which may indicate a dangerous submersion situation, and for triggering corresponding alerts and alarms. In this method, each monitored person is equipped with a lightweight electronic Tag worn on the body that communicates with monitors that issue the alerts and alarms, including audible and visible distress signals. The monitors, in turn, communicate the alarms to receivers used by supervisory personnel, such as lifeguards or parents. The invention may be used in aquatic environments, such as public recreation facilities, pools, waterfronts, and water parks, as well as in more private settings, such as homes, apartment buildings or hotels.
摘要:
A public key infrastructure comprising a participant that issues digital certificates. Each digital certificate can be relied upon in at least two different trust domains. The public key infrastructure does not employ policy mapping between or among the trust domains. Furthermore, the public key infrastructure does not link any pair of trust domains via cross-certificates. Just one trust domain is bound to the digital certificate at any given moment. The current trust domain that is to be bound to the digital certificate is elected by a relying party at the time of reliance, based upon a specific certificate validation methodology selected by the relying party.
摘要:
An inspection system for detecting anomalies on a substrate. The inspection system has a sensor array for generating image data. A first high speed network is coupled to the sensor array and receives and communicates the image data. An array of process nodes is coupled to the first high speed network, and receives and processes the image data to produce anomaly reports. Each process node has an interface card coupled to the first high speed network, that receives the image data from the first high speed network and formats the image data according to a high speed interface bus protocol. The interface card sets a register indicating whether a predetermined amount of image data has been stored in a memory, and the process node reads the register to determine whether the predetermined amount of image data has been stored in the memory, and initiates image processing when the register indicates that the predetermined amount of image data has been stored in the memory.
摘要:
Electronic Tags are mounted on swimmers to reduce their risk of drowning by identifying when their heads are underwater for periods of time which may indicate a dangerous submersion situation, and for triggering corresponding alerts and alarms. In this method, each monitored person is equipped with a lightweight electronic Tag worn on the head that communicates with monitors that issue the alerts and alarms, including audible and visible distress signals. The Tags comprise electrodes mounted on each side of a swimmer's head that close a circuit when said swimmer's nose or mouth is in the water. After a certain period of time, if the circuit is still closed, an alarm is sent to said monitors. The monitors, in turn, communicate the alarms to receivers used by supervisory personnel, such as lifeguards or parents. The invention may be used in aquatic environments, such as public recreation facilities, pools, waterfronts, and water parks, as well as in more private settings, such as homes, apartment buildings or hotels.
摘要:
A system and method are disclosed for transparently providing certificate validation and other services without requiring a separate service request by either a relying customer or subscribing customer. In a preferred embodiment, after the subscribing customer digitally signs a document (e.g., a commercial document such as a purchase order), it forwards the document to a trusted messaging entity which validates the certificates of both the subscribing customer and relying customer and the respective system participants of which they are customers. If the certificates are valid, the trusted messaging entity appends a validation message to the digitally-signed document and forwards the document to the relying customer. A validation message is also preferably appended to a digitally-signed receipt from the relying customer and transmitted to the subscribing customer. In this way, both the relying customer and subscribing customer obtain certification of their respective counterparty to the transaction.