摘要:
A microphone is provided for converting the impact force of a moving charged droplet into a corresponding electrical signal. A vertical support member supports a diaphragm in the path of the moving droplet. The diaphragm flexes or vibrates in response to a group of impinging droplets. A bimorph piezo-electric element is in contact with the diaphragm to move therewith and is fixedly secured at its opposite end to an adjacent housing member. The bimorph generates an electrical signal in response to bending stresses created when the bimorph is bent.
摘要:
An ink jet printer has a printing head which contains at least one cavity with a discharge orifice therein for dispersing droplets of ink onto a medium for printing thereon. Means are disclosed herein for maintaining the temperature of the ink in the cavity at a preselected value prior to dispersement from the discharge orifice. Preferably, the ink is heated by an electrical heating rod mounted in the printing head adjacent to the cavity. Means are also provided for sensing the temperature of the ink in the cavity. The heating rod is selectively energized to maintain the ink at the preselected temperature by means of a feedback control circuit coupled with the sensing means.
摘要:
An improved system for determining the optimal phase time to charge a liquid stream emitted from a jet as it evolves in form from a continuum to a separatuum of droplets wherein the optimal time for achieving the desired level of charge on a given droplet may be had by applying the charge immediately prior to break-off of droplets. A particular use of the system is in an ink jet droplet apparatus having a controlled liquid stream of ink that is separated into droplets by a sonic transducer and then charged by a pair of charging plates in a dynamically controlled manner at an optimal phase time as correctably tested by the system for subsequent static deflection of the charged droplets to a desired portion of a document to form printed characters.
摘要:
An apparatus and method of displaying a message on a display of a computing device. The message comprises at least a first attachment. At least a portion of the message is displayed to a user. The displayed portion comprises an identifier for the first attachment. In one embodiment, a security encoding indicator is associated with the identifier for the first attachment and displayed to the user. If a security encoding has been applied to the first attachment, the security encoding indicator indicates the security encoding applied to the first attachment.
摘要:
A cryptographic key is used to secure a communication link between a first device and a second device. Generating the cryptographic key is accomplished by a) generating a first cryptographic key, b) generating a second cryptographic key, c) applying a hash function to packets transmitted over the communication link to create a hash result, and d) applying the hash function to the first cryptographic key, the second cryptographic key and the hash result.
摘要:
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system determines whether the size of an encoded message is too large for a wireless communications device. If the message is too large, the server removes part of the message and sends an abbreviated message to the wireless device, together with additional information relating to processing of the encoded message, such as, for example, hash context values, that assist the wireless communications device in verifying the abbreviated message.
摘要:
A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device.
摘要:
A system and method for securing data for redirecting and transporting over a wireless network are generally described herein. In accordance with some embodiments, when it is determined that an electronic message that is protected with a first encryption algorithm is to be transported over a wireless network to a wireless device, the electronic message is converted to a data structure that is recognizable by the wireless device and the data structure is encrypted with a second encryption algorithm using a random session key. The second encryption algorithm has a stronger security than the first encryption algorithm. The random session key is encrypted with a public key and packets that comprise the encrypted data structure and the encrypted random session key are transmitted to the wireless device over the wireless network.
摘要:
A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device.
摘要:
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associate with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity check may uncover an issue that exists with sending a secure message to the recipient. A reason is determined for the validity check issue and is provided to the mobile device's user.